Abstract
The majority of Virtual Private Networks (VPNs) fail when it comes to protecting our privacy. If we are using a VPN to protect our online privacy, many of the well-known VPNs are not secure to use. When examined closely, VPNs can appear to be perfect on the surface but still be a complete privacy and security disaster. Some VPNs will steal our bandwidth, infect our computers with malware, install secret tracking libraries on our devices, steal our personal data, and leave our data exposed to third parties. Generally, Android users should be cautious when installing any VPN software on their devices. As a result, it is important to identify malicious VPNs before downloading and installing them on our Android devices. This paper provides an optimised deep learning neural network for identifying fake VPNs, and VPNs infected by malware based on the permissions of the apps, as well as a novel dataset of malicious and benign Android VPNs. Experimental results indicate that our proposed classifier identifies malicious VPNs with high accuracy, while it outperforms other standard classifiers in terms of evaluation metrics such as accuracy, precision, and recall.




Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.Data availability
The data have been made available by the authors through the Kaggle platform at https://www.kaggle.com/datasets/saeedseraj/mvdroid-a-malicious-android-vpn-detector-dataset.
References
Ikram M, Vallina-Rodriguez N, Seneviratne S, Kaafar MA, Paxson V (2016) An analysis of the privacy and security risks of android vpn permission-enabled apps. In: Proceedings of the 2016 internet measurement conference. https://doi.org/10.1145/2987443.2987471
Khattak S, Javed M, Khayam S A, Uzmi Z A, Paxson V (2014) A look at the consequences of internet censorship through an ISP lens. In: Proceedings of the 2014 Conference on internet measurement conference, Vancouver, pp 271–284
https://www.kaggle.com/datasets/saeedseraj/mvdroid-a-malicious-android-vpn-detector-dataset. Accessed 20 March 2022
VirusTotal. https://www.virustotal.com. Accessed 20 March 2022
Taha Khan M, DeBlasio J, Voelker G M, Snoeren A C, Kanich C, Rodriguez NV (2018) An empirical analysis of the commercial VPN ecosystem. In: Proceedings of the internet measurement conference 2018 (IMC’18). https://doi.org/10.1145/3278532.3278570
Wilson J, McLuskie D, Bayne E (2020) Investigation into the security and privacy of iOS VPN applications. In: Proceedings of the 15th international conference on availability, reliability and security (ARES ’20). https://doi.org/10.1145/3407023.3407029
Wangchuk T, Rathod D (2021) Forensic and behavior analysis of free android VPNs. J Appl Eng Technol Manag 1(1):91–101. https://doi.org/10.54417/jaetm.v1i1.27
Korty A, Calarco D, Spencer M (2021) Balancing risk with virtual private networking during a pandemic. Bus Horiz 64(6):757–761. https://doi.org/10.1016/j.bushor.2021.07.011
https://thehackernews.com/2022/06/sidewinder-hackers-use-fake-android-vpn.html?&web_view=true
Sihaga V, Vardhan M, Singh P (2021) A survey of android application and malware hardening. Comput Sci Rev 39:100365. https://doi.org/10.1016/j.cosrev.2021.100365
Arshad S, Ali Shah M, Khan A, Ahmed M (2016) Android malware detection & protection: a survey. Int J Adv Comput Sci Appl 7(2):466. https://doi.org/10.14569/IJACSA.2016.070262
Roussev V (2010) Data fingerprinting with similarity digests. IFIP Adv Inf Commun Technol 337:207–226. https://doi.org/10.1007/978-3-642-15506-2_15
YaraRules: yara-rules/rules; https://github.com/Yara-Rules/rules. Accessed 28 March 2022
Wang W, Wang X, Feng D, Liu J, Han Z, Zhang X (2014) Exploring permission-induced risk in android applications for malicious application detection. IEEE Trans Inform Forensics Secur 9(11):1869–1882. https://doi.org/10.1109/TIFS.2014.2353996
Talha KA, Alper DI, Aydin C (2015) APK auditor: permissionbased android malware detection system. Digit Investig 13:1–14. https://doi.org/10.1016/j.diin.2015.01.001
Li J, Sun L, Yan Q, Li Z, Srisa-An W, Ye H (2018) Significant permission identification for machine-learning-based android malware detection. IEEE Trans Indu Inform 14(7):3216–3225. https://doi.org/10.1109/TII.2017.2789219
Milosevic N, Dehghantanha A, Choo KKR (2017) Machine learning aided android malware classification. Comput Electr Eng Elsevier 61:266–274
Kang BJ, Yerima SY, McLaughlin K, Sezer S (2016) N-opcode analysis for android malware classification and categorization. In Proceedings of IEEE international conference on cyber security and protection of digital services (Cyber Security), pp 1–7
Sahin DO¨, Kural OE, Akleylek S et al (2021) A novel permission-based android malware detection system using feature selection based on linear regression. Neural ComputAppl 29:245–326
Mahindru A, Sangal AL (2021) MLDroid: framework for android malware detection using machine learning techniques. Neural Comput Appl 33(10):5183–5240
Seraj S, Khodambashi S, Pavlidis M, Polatidis N (2022) HamDroid: permission-based harmful android anti-malware detection using neural networks. Neural Comput Appli. https://doi.org/10.1007/s00521-02106755-4
Vidas T, Christin N (2014) Evading android runtime analysis via sandbox detection. In: Proceedings of the 9th ACM symposium on Information, computer and communications security, pp 447–458. https://doi.org/10.1145/2590296.2590325
Enck W, Gilbert P, Han S, Tendulkar V, Chun BG, Cox LP, Jung J, McDaniel P, Sheth AN (2014) TaintDroid. ACMTrans. Comput Syst 32(2):1–29. https://doi.org/10.1145/2619091
Gajrani J, Agarwal U, Laxmi V, Bezawada B, Gaur MS, Tripathi M, Zemmari A (2020) EspyDroid+: precise reflection analysis of android apps. Comput Secur 90:101688
Mahdavifar S, Alhadidi D, Ghorbani AA (2022) Effective and efficient hybrid android malware classification using pseudo-label stacked auto-encoder. J Netw Syst Manage 30:1–34
D’Angelo G, Palmieri F, Robustelli A (2022) A federated approach to Android malware classification through Perm-Maps. Cluster Comput 25(4):2487–2500
Seraj S, Pavlidis M, Polatidis N (2022) TrojanDroid: android malware detection for trojan discovery using convolutional neural networks. In: Engineering applications of neural networks: 23rd international conference, EAAAI/EANN 2022, Chersonissos, Crete, Greece, June 17–20, 2022, Proceedings, pp 203-212. Cham: Springer International Publishing
Ullah S, Ahmad T, Buriro A, Zara N, Saha S (2022) TrojanDetector: a multi-layer hybrid approach for trojan detection in android applications. Appl Sci 12(21):10755
Yerima SY, Alzaylaee MK, Shajan A (2021) Deep learning techniques for android botnet detection. Electronics 10(4):519
Moodi M, Ghazvini M, Moodi H (2021) A hybrid intelligent approach to detect android botnet using smart self-adaptive learning-based PSO-SVM. Knowl-Based Syst 222:106988
Amer E (2021) Permission-based approach for android malware analysis through ensemble-based voting model. In: Proceedings of the 2021 international mobile, intelligent, and ubiquitous computing conference (MIUCC), Cairo, Egypt, 26–27, pp 135–139
Wang H, Zhang W, He H (2022) You are what the permissions told me! Android malware detection based on hybrid tactics. J Inf Secur Appl 66:103159
Bahar Z (2022) Your free VPN app could be a trojan: How to spot fake vpns, NordVPN. https://nordvpn.com/blog/fake-vpn/ (Accessed: 23rd January 2023).
Glover C (2022) Sandstrike Fake VPN is latest in wave of new Android malware, Tech Monitor. https://techmonitor.ai/technology/cybersecurity/android-malware-sandstrike-fake-vpn (Accessed: 23 January 2023)
Editor (2022) Eset Research: Bahamut Group targets android users with fake VPN apps; spyware steals users' conversations, ESET. https://www.eset.com/int/about/newsroom/press-releases/research/eset-research-bahamut-group-targets-android-users-with-fake-vpn-apps-spyware-steals-users-convers/ (Accessed: 23 January 2023)
Li L, Li D, Bissyandé TF, Klein J, Le Traon Y, Lo D, Cavallaro L (2017) Understanding android app piggybacking: a systematic study of malicious code grafting. IEEE Trans Inf Forensics Secur 12(6):1269–1284
Arp D, Spreitzenbarth M, Hubner M, Gascon H, Rieck K, Siemens CERT (2014) Drebin: effective and explainable detection of android malware in your pocket. In: Ndss (Vol. 14, pp 23–26)
Pendlebury F, Pierazzi F, Jordaney R, Kinder J, Cavallaro L (2019) {TESSERACT}: eliminating experimental bias in malware classification across space and time. In: 28th USENIX security symposium (USENIX Security 19) (pp 729–746)
Salem A, Banescu S, Pretschner A (2021) Maat: automatically analyzing virustotal for accurate labeling and effective malware detection. ACM Trans Priv Secur (TOPS) 24(4):1–35
Funding
This research received no external funding.
Author information
Authors and Affiliations
Contributions
SS and NP contributed to data collection. SS and SK contributed to algorithm development. SS, SK and MP wrote the main manuscript. SS and NP prepared the figures. SS, SK, MP, and NP contributed to evaluation. NP reviewed the manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Seraj, S., Khodambashi, S., Pavlidis, M. et al. MVDroid: an android malicious VPN detector using neural networks. Neural Comput & Applic 35, 21555–21565 (2023). https://doi.org/10.1007/s00521-023-08512-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-023-08512-1
Keywords
Profiles
- Nikolaos Polatidis View author profile