Abstract
Now a day people are widely using smart phones with lot of different applications. Smartphones are mostly using android as platform. It offers a huge amount of information to its users. It allows user to download and install applications free from any source either it is verified or not. This is really a threat for android user as lot of open source available application contains malwares and infected software. Not only android users but windows users are also facing these problems. Malware through different sources (usb, cd, drives, emails etc.) are moving from one system to other. In this paper we have discussed some well-defined approaches for android as well as windows-based system security for malware detection. The paper discusses different methods of signature based, behavioral based and heuristic based techniques for malware detection.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., Siemens, C.E.R.T.: DREBIN: effective and explainable detection of android malware in your pocket. In: Ndss, vol. 14, pp. 23–26. (2014)
Mobile threat report 2012 q3: F-Secure Response Labs (2012)
Enck, W., Ongtang, M., McDaniel, P.D.: On lightweight mobile phone application certification. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), pp. 235–245 (2009)
Peng, H., et al.: Using probabilistic generative models for ranking risks of android apps. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), pp. 241–252 (2012)
Sarma, B.P., Li, N., Gates, C., Potharaju, R., NitaRotaru, C., Molloy, I.: Android permissions: a perspective combining risks and benefits. In: Proceedings of the ACM symposium on Access Control Models and Technologies (SACMAT), pp. 13–22 (2012)
Jiang, X.: Security alert: new droidkungfu variant (2011). http://www.csc.ncsu.edu/faculty/jiang/DroidKungFu3/
Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), pp. 627–638 (2011)
Cristianini, N., Shawe-Taylor, J.: An Introduction to Support Vector Machines. Cambridge University Press, Cambridge (2000)
Fan, R.-E., Chang, K.-W., Hsieh, C.-J., Wang, X.-R., Lin, C.-J.: LIBLINEAR: a library for large linear classification. J. Mach. Learn. Res. (JMLR) 9, 1871–1874 (2008)
Bazrafshan, Z., Hashemi, H., Fard, S.M.H., Hamzeh, A.: A survey on heuristic malware detection techniques. In: 2013 5th Conference on Information and Knowledge Technology (IKT), pp. 113–120. IEEE (2013)
Szor, P.: The Art of Computer Virus Research and Defense. Addison Wesley for Symantec Press, New Jersey (2005)
Gutmann, P.: The Commercial Malware Industry (2007)
KALPA: Introduction to Malware (2011). http://securityresearch.in/index.php/projects/malware_lab/introduction-to-malware/8/
Jacob, G., Debar, H., Filiol, E.: Behavioral detection of malware: from a survey towards an established taxonomy. J. Comput. Virol. 4, 251–266 (2008)
Elhadi, A.A.E., Maarof, M.A., Osman, A.H.: Malware detection based on hybrid signature behaviour application programming interface call graph information assurance and security research group. Am. J. Appl. Sci. 9(3), 283–288 (2012). Faculty of Computer Science and Information Systems
Orenstein, D.: Application Programming Interface (API). Quick Study: Application Programming Interface (API) (2000)
Hofmeyr, S.A., Forrest, S., Somayaji, A.: Intrusion detection using sequences of system calls. J. Comput. Secur. 6, 151–180 (1998)
Bergeron, J., Debbabi, M., Desharnais, J., Erhioui, M.M., Lavoie, Y., Tawbi, N.: Static detection of malicious code in executable programs. Int. J. Req. Eng. (2001)
Sekar, R., Bendre, M., Bollineni, P., Dhurjati, D.: A fast automaton based approach for detecting anomalous program behaviors. In: IEEE Symposium on Security and Privacy (2001)
Sung, A.H., Xu, J., Chavez, P., Mukkamala, S.: Static analyzer of vicious executables. In: 20th Annual Computer Security Applications Conference, pp. 326–334 (2004)
Ye, Y., Wang, D., Li, T., Ye, D.: IMDS: Intelligent malware detection system. In: Proceedings of the ACM International Conference on Knowledge Discovery Data Mining, pp. 1043–1047 (2007)
Ye, Y., Li, T., Jiang, Q., Wang, Y.: CIMDS: adapting postprocessing techniques of associative classification for malware detection. IEEE Trans. Syst. Man Cybern. C 40(3), 298–307 (2010)
Bilar, D.: OpCodes as predictor for malware. Int. J. Electron. Secur. Digit. Forensics 1(2), 156 (2007)
Santos, I., Brezo, F., Nieves, J., Penya, Y.: Idea: OpCode-sequence-based malware detection. In: Massacci, F., Wallach, D., Zannone, N. (eds.) Engineering Secure Software and System. LNCS, vol. 5965, pp. 35–43. Springer, Heidelberg (2010)
Peng, H., Long, F., Ding, C.: Feature selection based on mutual information: criteria of max-dependency, max-relevance, and minredundancy. IEEE Trans. Pattern Anal. Mach. Intell. 27, 1226–1238 (2005)
Santos, I., Brezo, F., Ugarte-Pedrero, X., Bringas, P.G.: OpCode sequences as representation of executables for data-mining-based unknown malware detection. Inf. Sci. 231, 64–82 (2011)
Santos, I., Laorden, C., Bringas, P.G.: Collective classification for unknown malware detection. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (2011)
Santos, I., Brezo, F., Sanz, B., Laorden, C., Bringas, P.G.: Using opCode sequences in single-class learning to detect unknown malware. IET Inf. Secur. 5(4), 220 (2011)
Santos, I., Sanz, B., Laorden, C., Brezo, F., Bringas, P.G.: Opcode-sequence-based semi-supervised unknown malware detection. In: Herrero, Á., Corchado, E. (eds.) CISIS 2011. LNCS, vol. 6694, pp. 50–57. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-21323-6_7
Abou-assaleh, T., Cercone, N., Keß, V., Sweidan, R.: N-gram-based detection of new malicious code, no. 1 (2004)
Tesauro, G.J., Kephart, J.O., Sorkin, G.B.: Neural network for computer virus recognition. IEEE Expert 11, 5–6 (1996)
Arnold, W., Tesauro, G.: Automatically generated Win32 heuristic virus detection. In: Virus Bulletin Conference (2000)
Kolter, J.Z., Maloof, M.A.: Learning to detect malicious executables in the wild. In: Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2006)
Kolter, J.Z., Maloof, M.A.: Learning to detect and classify malicious executables in the wild. J. Mach. Learn. Res. 7, 2721–2744 (2006)
Elovici, Y., Moskovitch, R., Stopel, D., Feher, C., Nissim, N., Japkowicz, N.: Unknown malcode detection and the imbalance problem. J. Comput. Virol. 5(4), 295 (2009)
Jalote, P.: An Integrated Approach to Software Engineering. Springer, New York (2005). https://doi.org/10.1007/0-387-28132-0
McCabe, T.: A complexity measure. IEEE Trans. Softw. Eng. SE 2(4), 308–320 (1976)
Tan, L.: The worst case execution time tool challenge. The External Test, Technical report (2006)
Bruschi, D., Martignoni, L., Monga, M.: Detecting self-mutating malware using control-flow graph matching. In: Büschkes, R., Laskov, P. (eds.) Detection of Intrusions and Malware & Vulnerability Assessment, volume 4064 of LNCS, pp. 129–143. Springer, Heidelberg (2006). https://doi.org/10.1007/11790754_8
Zhao, Z.: A virus detection scheme based on features of control flow graph. In: 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), pp. 943– 947 (2011)
Eskandari, M., Hashemi, S.: Metamorphic malware detection using control flow graph mining. Int. J. Comput. Sci. Netw. Secur. 11, 1–6 (2011)
Lu, Y., Din, S., Zheng, C., Gao, B.: Using multi-feature and classifier ensembles to improve malware detection. J. CCIT 39(2), 57–72 (2010)
Firdausi, I., Erwin, A., Nugroho, A.S.: Analysis of machine learning techniques used in behavior-based malware detection. In: 2010 Second International Conference on Advances in Computing, Control and Telecommunication Technologies (ACT), pp. 201–203. IEEE (2010)
Bayer, U., Kruegel, C., Kirda, E.: TTAnalyze: a tool for analyzing malware. In: 15th Annual Conference of the European Institute for Computer Antivirus Research, Hamburg, Germany, pp. 180–192 (2006)
Ye, Y., Li, T., Adjeroh, D., Iyengar, S.S.: A survey on malware detection using data mining techniques. ACM Comput. Surv. 50(3) (2017). Article no. 41
Popov, I.: Malware detection using machine learning based on Word2vec embedding of machine code instruction. 978-1-5386-1593-5/17/$31.00 (2017)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Bilal, S.F., Bashir, S., Khan, F.H., Rasheed, H. (2019). Malwares Detection for Android and Windows System by Using Machine Learning and Data Mining. In: Bajwa, I., Kamareddine, F., Costa, A. (eds) Intelligent Technologies and Applications. INTAP 2018. Communications in Computer and Information Science, vol 932. Springer, Singapore. https://doi.org/10.1007/978-981-13-6052-7_42
Download citation
DOI: https://doi.org/10.1007/978-981-13-6052-7_42
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-6051-0
Online ISBN: 978-981-13-6052-7
eBook Packages: Computer ScienceComputer Science (R0)