Skip to main content

Malwares Detection for Android and Windows System by Using Machine Learning and Data Mining

  • Conference paper
  • First Online:
  • 1513 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 932))

Abstract

Now a day people are widely using smart phones with lot of different applications. Smartphones are mostly using android as platform. It offers a huge amount of information to its users. It allows user to download and install applications free from any source either it is verified or not. This is really a threat for android user as lot of open source available application contains malwares and infected software. Not only android users but windows users are also facing these problems. Malware through different sources (usb, cd, drives, emails etc.) are moving from one system to other. In this paper we have discussed some well-defined approaches for android as well as windows-based system security for malware detection. The paper discusses different methods of signature based, behavioral based and heuristic based techniques for malware detection.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., Siemens, C.E.R.T.: DREBIN: effective and explainable detection of android malware in your pocket. In: Ndss, vol. 14, pp. 23–26. (2014)

    Google Scholar 

  2. Mobile threat report 2012 q3: F-Secure Response Labs (2012)

    Google Scholar 

  3. Enck, W., Ongtang, M., McDaniel, P.D.: On lightweight mobile phone application certification. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), pp. 235–245 (2009)

    Google Scholar 

  4. Peng, H., et al.: Using probabilistic generative models for ranking risks of android apps. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), pp. 241–252 (2012)

    Google Scholar 

  5. Sarma, B.P., Li, N., Gates, C., Potharaju, R., NitaRotaru, C., Molloy, I.: Android permissions: a perspective combining risks and benefits. In: Proceedings of the ACM symposium on Access Control Models and Technologies (SACMAT), pp. 13–22 (2012)

    Google Scholar 

  6. Jiang, X.: Security alert: new droidkungfu variant (2011). http://www.csc.ncsu.edu/faculty/jiang/DroidKungFu3/

  7. Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), pp. 627–638 (2011)

    Google Scholar 

  8. Cristianini, N., Shawe-Taylor, J.: An Introduction to Support Vector Machines. Cambridge University Press, Cambridge (2000)

    Google Scholar 

  9. Fan, R.-E., Chang, K.-W., Hsieh, C.-J., Wang, X.-R., Lin, C.-J.: LIBLINEAR: a library for large linear classification. J. Mach. Learn. Res. (JMLR) 9, 1871–1874 (2008)

    Google Scholar 

  10. Bazrafshan, Z., Hashemi, H., Fard, S.M.H., Hamzeh, A.: A survey on heuristic malware detection techniques. In: 2013 5th Conference on Information and Knowledge Technology (IKT), pp. 113–120. IEEE (2013)

    Google Scholar 

  11. Szor, P.: The Art of Computer Virus Research and Defense. Addison Wesley for Symantec Press, New Jersey (2005)

    Google Scholar 

  12. Gutmann, P.: The Commercial Malware Industry (2007)

    Google Scholar 

  13. KALPA: Introduction to Malware (2011). http://securityresearch.in/index.php/projects/malware_lab/introduction-to-malware/8/

  14. Jacob, G., Debar, H., Filiol, E.: Behavioral detection of malware: from a survey towards an established taxonomy. J. Comput. Virol. 4, 251–266 (2008)

    Google Scholar 

  15. Elhadi, A.A.E., Maarof, M.A., Osman, A.H.: Malware detection based on hybrid signature behaviour application programming interface call graph information assurance and security research group. Am. J. Appl. Sci. 9(3), 283–288 (2012). Faculty of Computer Science and Information Systems

    Google Scholar 

  16. Orenstein, D.: Application Programming Interface (API). Quick Study: Application Programming Interface (API) (2000)

    Google Scholar 

  17. Hofmeyr, S.A., Forrest, S., Somayaji, A.: Intrusion detection using sequences of system calls. J. Comput. Secur. 6, 151–180 (1998)

    Google Scholar 

  18. Bergeron, J., Debbabi, M., Desharnais, J., Erhioui, M.M., Lavoie, Y., Tawbi, N.: Static detection of malicious code in executable programs. Int. J. Req. Eng. (2001)

    Google Scholar 

  19. Sekar, R., Bendre, M., Bollineni, P., Dhurjati, D.: A fast automaton based approach for detecting anomalous program behaviors. In: IEEE Symposium on Security and Privacy (2001)

    Google Scholar 

  20. Sung, A.H., Xu, J., Chavez, P., Mukkamala, S.: Static analyzer of vicious executables. In: 20th Annual Computer Security Applications Conference, pp. 326–334 (2004)

    Google Scholar 

  21. Ye, Y., Wang, D., Li, T., Ye, D.: IMDS: Intelligent malware detection system. In: Proceedings of the ACM International Conference on Knowledge Discovery Data Mining, pp. 1043–1047 (2007)

    Google Scholar 

  22. Ye, Y., Li, T., Jiang, Q., Wang, Y.: CIMDS: adapting postprocessing techniques of associative classification for malware detection. IEEE Trans. Syst. Man Cybern. C 40(3), 298–307 (2010)

    Google Scholar 

  23. Bilar, D.: OpCodes as predictor for malware. Int. J. Electron. Secur. Digit. Forensics 1(2), 156 (2007)

    Google Scholar 

  24. Santos, I., Brezo, F., Nieves, J., Penya, Y.: Idea: OpCode-sequence-based malware detection. In: Massacci, F., Wallach, D., Zannone, N. (eds.) Engineering Secure Software and System. LNCS, vol. 5965, pp. 35–43. Springer, Heidelberg (2010)

    Google Scholar 

  25. Peng, H., Long, F., Ding, C.: Feature selection based on mutual information: criteria of max-dependency, max-relevance, and minredundancy. IEEE Trans. Pattern Anal. Mach. Intell. 27, 1226–1238 (2005)

    Google Scholar 

  26. Santos, I., Brezo, F., Ugarte-Pedrero, X., Bringas, P.G.: OpCode sequences as representation of executables for data-mining-based unknown malware detection. Inf. Sci. 231, 64–82 (2011)

    Google Scholar 

  27. Santos, I., Laorden, C., Bringas, P.G.: Collective classification for unknown malware detection. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (2011)

    Google Scholar 

  28. Santos, I., Brezo, F., Sanz, B., Laorden, C., Bringas, P.G.: Using opCode sequences in single-class learning to detect unknown malware. IET Inf. Secur. 5(4), 220 (2011)

    Google Scholar 

  29. Santos, I., Sanz, B., Laorden, C., Brezo, F., Bringas, P.G.: Opcode-sequence-based semi-supervised unknown malware detection. In: Herrero, Á., Corchado, E. (eds.) CISIS 2011. LNCS, vol. 6694, pp. 50–57. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-21323-6_7

    Google Scholar 

  30. Abou-assaleh, T., Cercone, N., Keß, V., Sweidan, R.: N-gram-based detection of new malicious code, no. 1 (2004)

    Google Scholar 

  31. Tesauro, G.J., Kephart, J.O., Sorkin, G.B.: Neural network for computer virus recognition. IEEE Expert 11, 5–6 (1996)

    Google Scholar 

  32. Arnold, W., Tesauro, G.: Automatically generated Win32 heuristic virus detection. In: Virus Bulletin Conference (2000)

    Google Scholar 

  33. Kolter, J.Z., Maloof, M.A.: Learning to detect malicious executables in the wild. In: Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2006)

    Google Scholar 

  34. Kolter, J.Z., Maloof, M.A.: Learning to detect and classify malicious executables in the wild. J. Mach. Learn. Res. 7, 2721–2744 (2006)

    Google Scholar 

  35. Elovici, Y., Moskovitch, R., Stopel, D., Feher, C., Nissim, N., Japkowicz, N.: Unknown malcode detection and the imbalance problem. J. Comput. Virol. 5(4), 295 (2009)

    Google Scholar 

  36. Jalote, P.: An Integrated Approach to Software Engineering. Springer, New York (2005). https://doi.org/10.1007/0-387-28132-0

    Google Scholar 

  37. McCabe, T.: A complexity measure. IEEE Trans. Softw. Eng. SE 2(4), 308–320 (1976)

    Google Scholar 

  38. Tan, L.: The worst case execution time tool challenge. The External Test, Technical report (2006)

    Google Scholar 

  39. Bruschi, D., Martignoni, L., Monga, M.: Detecting self-mutating malware using control-flow graph matching. In: Büschkes, R., Laskov, P. (eds.) Detection of Intrusions and Malware & Vulnerability Assessment, volume 4064 of LNCS, pp. 129–143. Springer, Heidelberg (2006). https://doi.org/10.1007/11790754_8

    Google Scholar 

  40. Zhao, Z.: A virus detection scheme based on features of control flow graph. In: 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), pp. 943– 947 (2011)

    Google Scholar 

  41. Eskandari, M., Hashemi, S.: Metamorphic malware detection using control flow graph mining. Int. J. Comput. Sci. Netw. Secur. 11, 1–6 (2011)

    Google Scholar 

  42. Lu, Y., Din, S., Zheng, C., Gao, B.: Using multi-feature and classifier ensembles to improve malware detection. J. CCIT 39(2), 57–72 (2010)

    Google Scholar 

  43. Firdausi, I., Erwin, A., Nugroho, A.S.: Analysis of machine learning techniques used in behavior-based malware detection. In: 2010 Second International Conference on Advances in Computing, Control and Telecommunication Technologies (ACT), pp. 201–203. IEEE (2010)

    Google Scholar 

  44. Bayer, U., Kruegel, C., Kirda, E.: TTAnalyze: a tool for analyzing malware. In: 15th Annual Conference of the European Institute for Computer Antivirus Research, Hamburg, Germany, pp. 180–192 (2006)

    Google Scholar 

  45. Ye, Y., Li, T., Adjeroh, D., Iyengar, S.S.: A survey on malware detection using data mining techniques. ACM Comput. Surv. 50(3) (2017). Article no. 41

    Google Scholar 

  46. Popov, I.: Malware detection using machine learning based on Word2vec embedding of machine code instruction. 978-1-5386-1593-5/17/$31.00 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Syed Fakhar Bilal or Saba Bashir .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bilal, S.F., Bashir, S., Khan, F.H., Rasheed, H. (2019). Malwares Detection for Android and Windows System by Using Machine Learning and Data Mining. In: Bajwa, I., Kamareddine, F., Costa, A. (eds) Intelligent Technologies and Applications. INTAP 2018. Communications in Computer and Information Science, vol 932. Springer, Singapore. https://doi.org/10.1007/978-981-13-6052-7_42

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-6052-7_42

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-6051-0

  • Online ISBN: 978-981-13-6052-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics