Abstract
Android platforms are a popular target for attackers, while many users around the world are victims of Android malwares threatening their private information. Numerous Android anti-malware applications are fake and do not work as advertised because they have been developed either by amateur programmers or by software companies that are not focused on the security aspects of the business. Such applications usually ask for and generally receive non-necessary permissions which at the end collect sensitive information. The rapidly developing fake anti-malware is a serious problem, and there is a need for detection of harmful Android anti-malware. This article delivers a dataset of Android anti-malware, including malicious or benign, and a customized multilayer perceptron neural network that is being used to detect anti-malware based on the permissions of the applications. The results show that the proposed method can detect with very high accuracy fake anti-malware, while it outperforms other standard classifiers in terms of accuracy, precision, and recall.






Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.References
https://www.av-comparatives.org/tests/android-test-2019-250-apps/
Razgallaha A, Khourya R, Hallé S, Khanmohammadi K (2021) A survey of malware detection in Android apps: recommendations and perspectives for future research. Comput Sci Rev. https://doi.org/10.1016/j.cosrev.2020.100358
https://www.kaggle.com/saeedseraj/a-dataset-for-fake-android-antimalware-detection
Sihaga V, Vardhan M, Singh P (2021) A survey of android application and malware hardening. Comput Sci Rev. https://doi.org/10.1016/j.cosrev.2021.100365
Mathur A, Mounika L, Ahmad P, Javaid Y (2021) NATICUSdroid: A malware detection framework for Android using native and custom permissions. J Inf Secur Appl 58:102696. https://doi.org/10.1016/j.jisa.2020.102696
Sihaga V, Vardhan M, Singh P (2021) BLADE: robust malware detection against obfuscation in android. Forensic Sci Int: Digit Investig 38:301176. https://doi.org/10.1016/j.fsidi.2021.301176
Arshad S, Ali M, Khan A, Ahmed M (2016) Android malware detection & protection: a survey. Int J Adv Comput Sci Appl 7(2):466. https://doi.org/10.14569/IJACSA.2016.070262
Kornblum J (2006) Identifying almost identical files using context triggered piecewise hashing. Digit Investig 3(1):91–97. https://doi.org/10.1016/j.diin.2006.06.015
Roussev V (2010) Data fingerprinting with similarity digests. In: IFIP advances in information and communication technology, vol 337 AICT. Springer, Berlin, pp 207–226. https://doi.org/10.1007/978-3-642-15506-2_15
Faruki P, Ganmoor V, Laxmi V, Gaur MS, Bharmal A (2013) AndroSimilar: robust signature for detecting variants of android malware. In: Proceedings of the 6th international conference on security of information and networks—SIN ’13. ACM Press, New York, pp 152–159. https://doi.org/10.1145/2523514.2523539
[droidmoss?] Zhou Y, Jiang X (2012) Dissecting android malware: characterization and evolution. In: Proceedings—IEEE symposium on security and privacy. IEEE, pp 95–109. https://doi.org/10.1109/SP.2012.16
YaraProject: YaraRules Project (2019). https://yararules.com/. Accessed 28 July 2019
YaraRules: yara-rules/rules (2019). https://github.com/Yara-Rules/rules
Wang W, Wang X, Feng D, Liu J, Han Z, Zhang X (2014) Exploring permission-induced risk in android applications for malicious application detection. IEEE Trans Inform Forensics Secur 9(11):1869–1882. https://doi.org/10.1109/TIFS.2014.2353996
Li J, Sun L, Yan Q, Li Z, Srisa-An W, Ye H (2018) Significant permission identification for machine-learning-based android malware detection. IEEE Trans Ind Inform 14(7):3216–3225. https://doi.org/10.1109/TII.2017.2789219
Talha KA, Alper DI, Aydin C (2015) APK auditor: permission-based android malware detection system. Digit Investig 13:1–14. https://doi.org/10.1016/j.diin.2015.01.001
Sanz B, Santos I, Laorden C, Ugarte-Pedrero X, Bringas PG, Álvarez G (2013) PUMA: permission usage to detect malware in android. In: Advances in intelligent systems and computing, vol 189 AISC. Springer, Berlin, pp 289–298. https://doi.org/10.1007/978-3-642-33018-6_30
Verma S, Muttoo SK (2016) An android malware detection framework-based on permissions and intents. Def Sci J 66(6):618–623
Milosevic N, Dehghantanha A, Choo KKR (2017) Machine learning aided Android malware classification. Comput Electr Eng 61:266–274
Kang BJ, Yerima SY, McLaughlin K, Sezer S (2016) N-opcode analysis for android malware classification and categorization. In: Proceedings of IEEE international conference on cyber security and protection of digital services (cyber security), pp 1–7
Kim J, Yoon Y., Yi K, Shin J, Center SWRD (2012) ScanDal: static analyzer for detecting privacy leaks in android applications. MoST 12(110):1. http://www.ieee-security.org/TC/SP2012/posters/ScanDal.pdf. Accessed 17 Apr 2019
Rastogi V, Qu Z, McClurg J, Cao Y, Chen Y (2015) Uranine: real-time privacy leakage monitoring without system modification for android. In: Lecture notes of the institute for computer sciences, social-informatics and telecommunications engineering, LNICST, vol 164. Springer, Cham, pp 256–276. https://doi.org/10.1007/978-3-319-28865-9_14
Shabtai A, Kanonov U, Elovici Y, Glezer C, Weiss Y (2012) “Andromaly”: a behavioral malware detection framework for android devices. J Intell Inform Syst 38(1):161–190. https://doi.org/10.1007/s10844-010-0148-x
Enck W, Gilbert P, Han S, Tendulkar V, Chun BG, Cox LP, Jung J, McDaniel P, Sheth AN (2014) TaintDroid. ACMTrans Comput Syst 32(2):1–29. https://doi.org/10.1145/2619091
Zhang F, Leach K, Stavrou A, Wang H, Sun K (2015) Using hardware features for increased debugging transparency. In: Proceedings—IEEE symposium on security and privacy, vol 2015-July, pp 55–69. https://doi.org/10.1109/SP.2015.11
Sylve J, Case A, Marziale L, Richard GG (2012) Acquisition and analysis of volatile memory from android devices. Digit Investig 8(3–4):175–184. https://doi.org/10.1016/j.diin.2011.10.003
Vidas T, Christin N (2014) Evading android runtime analysis via sandbox detection. In: Proceedings of the 9th ACM symposium on information, computer and communications security—ASIA CCS’14. ACMPress, New York, pp 447–458. https://doi.org/10.1145/2590296.2590325
Burguera I, Zurutuza U, Nadjm-Tehrani S (2011) Crowdroid: behavior-based malware detection system for Android. In: Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices—SPSM ’11, p 15. ACM Press, New York. https://doi.org/10.1145/2046614.2046619
Yan LK, Yin H (2012) DroidScope: seamlessly reconstructing the OS and Dalvik semantic views for dynamic Android malware analysis. In: Proceedings of the 21st USENIX conference on Security symposium. USENIX Association Berkeley, CA, USA, Bellevue, WA, pp 1–16
Lindorfer M, Neugschwandtner M, Weichselbaum L, Fratantonio Y, Veen VVD, Platzer C (2016) ANDRUBIS—1,000,000 apps later: a view on current android malware behaviors. In: Proceedings—3rd international workshop on building analysis datasets and gathering experience returns for security, BADGERS 2014, pp 3–17. IEEE. https://doi.org/10.1109/BADGERS.2014.7
Gajrani J, Agarwal U, Laxmi V, Bezawada B, Gaur MS, Tripathi M, Zemmari A (2020) EspyDroid+: precise reflection analysis of android apps. Comput Secur 90:101688
Mahindru A, Sangal AL (2021) MLDroid—framework for Android malware detection using machine learning techniques. Neural Comput Appl 33(10):5183–5240
Şahin DÖ, Kural OE, Akleylek S, Kılıç E (2021) A novel permission-based Android malware detection system using feature selection based on linear regression. Neural Comput Appl 29:245–262
Gao H, Cheng S, Zhang W (2021) GDroid: Android malware detection and classification with graph convolutional network. Comput Secur 106:102264
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Seraj, S., Khodambashi, S., Pavlidis, M. et al. HamDroid: permission-based harmful android anti-malware detection using neural networks. Neural Comput & Applic 34, 15165–15174 (2022). https://doi.org/10.1007/s00521-021-06755-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-021-06755-4
Keywords
Profiles
- Nikolaos Polatidis View author profile