Skip to main content

Advertisement

Log in

Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management

  • Mobile & Wireless Health
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

The increasing demand for Android mobile devices and blockchain has motivated malware creators to develop mobile malware to compromise the blockchain. Although the blockchain is secure, attackers have managed to gain access into the blockchain as legal users, thereby comprising important and crucial information. Examples of mobile malware include root exploit, botnets, and Trojans and root exploit is one of the most dangerous malware. It compromises the operating system kernel in order to gain root privileges which are then used by attackers to bypass the security mechanisms, to gain complete control of the operating system, to install other possible types of malware to the devices, and finally, to steal victims’ private keys linked to the blockchain. For the purpose of maximizing the security of the blockchain-based medical data management (BMDM), it is crucial to investigate the novel features and approaches contained in root exploit malware. This study proposes to use the bio-inspired method of practical swarm optimization (PSO) which automatically select the exclusive features that contain the novel android debug bridge (ADB). This study also adopts boosting (adaboost, realadaboost, logitboost, and multiboost) to enhance the machine learning prediction that detects unknown root exploit, and scrutinized three categories of features including (1) system command, (2) directory path and (3) code-based. The evaluation gathered from this study suggests a marked accuracy value of 93% with Logitboost in the simulation. Logitboost also helped to predicted all the root exploit samples in our developed system, the root exploit detection system (RODS).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  1. Zapata, B. C., Fernández-alemán, J. L., Toval, A., and Idri, A., Reusable software usability specifications for mHealth applications. J. Med. Syst. 42:1–9, 2018.

    Article  Google Scholar 

  2. Imtiaz, S. A., Krishnaiah, S., Yadav, S. K., Bharath, B., and Ramani, R. V., Benefits of an android based tablet application in primary screening for eye diseases in a rural population, India. J. Med. Syst. 41(4):49, 2017.

    Article  PubMed  Google Scholar 

  3. Elhoseny, M., Abdelaziz, A., Salama, A. S., Riad, A. M., Muhammad, K., and Sangaiah, A. K., A hybrid model of internet of things and cloud computing to manage big data in health services applications. Futur. Gener. Comput. Syst., 2018.

  4. Greene, T., Blockchain can help secure medical devices, improve patient privacy, 2017. [Online]. Available: https://www.networkworld.com/article/3184614/security/blockchain-can-help-secure-medical-devices-improve-patient-privacy.html. [Accessed: 06-Feb-2018].

  5. Puthal, D., Malik, N., Mohanty, S. P., Kougianos, E., and Yang, C., The blockchain as a decentralized security framework. IEEE Consumer Electronics Magazine 7(2):18–21, 2018.

    Article  Google Scholar 

  6. De, N., Hacks, scams and attacks: Blockchain’s 2017 disasters, 2018. [Online]. Available: https://www.coindesk.com/hacks-scams-attacks-blockchains-biggest-2017-disasters/. [Accessed: 01-Apr-2018].

  7. Ma, Y., and Sharbaf, M. S., Investigation of static and dynamic android anti-virus strategies. In: 10th International Conference on Information Technology: New Generations (ITNG), Las Vegas, Nevada, 2013, 398–403.

  8. Schmidt, A. et al., Smartphone malware evolution revisited: android next target? In: IEEE Conference Publications, Montreal, Quebec, Canada, 2009, 1–7.

  9. Bickford, J., O’Hare, R., Baliga, A., Ganapathy, V., and Liviu, I., Rootkits on smart phones: attacks, implications and opportunities. In: HotMobile ‘10 Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, Annapolis, Maryland, 2010, 49–54.

  10. Felt, A. P., Finifter, M., Chin, E., Hanna, S., and Wagner, D., A survey of mobile malware in the wild. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Illinois, USA, 2011, 3–14.

  11. Khan, S., Gani, A., Wahab, A. W. A., and Singh, P. K., Feature selection of denial-of-service attacks using entropy and granular computing. Arab. J. Sci. Eng., 2017.

  12. Tahaei, H., Salleh, R., Razak, M. F. A., Ko, K., and Anuar, N. B., Cost effective network flow measurement for software defined networks: A distributed controller scenario. In: IEEE Access, 2018, 1–17.

  13. Narudin, F. A., Feizollah, A., Anuar, N. B., and Gani, A., Evaluation of machine learning classifiers for mobile malware detection. Soft. Comput. 20(1):343–357, 2014.

    Article  Google Scholar 

  14. Afifi, F., Anuar, N. B., Shamshirband, S., and Choo, K.-K. R., DyHAP: Dynamic hybrid ANFIS-PSO approach for predicting mobile malware. PLoS One 11(9):1–21, 2016.

    Article  Google Scholar 

  15. Lee, J., Lee, S., and Heejo, L., Screening smartphone applications using malware family signatures. Comput. Secur. 52:234–249, 2015.

    Article  Google Scholar 

  16. Apvrille, A., and Strazzere, T., Reducing the window of opportunity for android malware Gotta catch ‘em all. J. Comput. Virol. 8(1):61–71, 2012.

    Article  Google Scholar 

  17. Feizollah, A., Anuar, N. B., Salleh, R., and Wahab, A. W. A., A review on feature selection in mobile malware detection. Digit. Investig. 13:22–37, 2015.

    Article  Google Scholar 

  18. Alhendawi, K. M., Predicting the effectiveness of web information systems using neural networks modeling: framework & empirical testing. International Journal of Software Engineering and Computer Systems (IJSECS) 4(1):61–74, 2018.

    Article  Google Scholar 

  19. Pirbhulal, S., Zhang, H., Wu, W., Mukhopadhyay, S. C., and Zhang, Y.-T., Heart-beats based biometric random binary sequences generation to secure wireless body sensor networks. IEEE Trans. Biomed. Eng.:1–9, 2018.

  20. Pirbhulal, S., Zhang, H., Mukhopadhyay, S., Li, C., Wang, Y., Li, G., Wu, W., and Zhang, Y. T., An efficient biometric-based algorithm using heart rate variability for securing body sensor networks. Sensors 15(7):15067–15089, 2015.

    Article  PubMed  PubMed Central  Google Scholar 

  21. Pirbhulal, S., Zhang, H., Wu, W., and Zhang, Y. T., A novel biometric algorithm to body sensor networks. In: Wearable Electronics Sensors, Smart Sensors, Measurement and Instrumentation. Vol. 15, 2015, 57–79.

  22. Pirbhulal, S., Zhang, H., Wu, W., and Zhang, Y.-T., A comparative study of fuzzy vault based security methods for wireless body sensor networks. In: Proceedings of the International Conference on Sensing Technology (ICST), Nanjing, China, 2016, 1–6.

  23. Pirbhulal, S., Zhang, H., and Wu, W., HRV-based biometric privacy-preserving and security mechanism for wireless body sensor networks. In: Wearable Sensors Applications, Design and Implementation, 2017, 12-1-27.

  24. Ullah, F., Edwards, M., Ramdhany, R., Chitchyan, R., Babar, M. A., and Rashid, A., Data exfiltration: A review of external attack vectors and countermeasures. J. Netw. Comput. Appl. 101:18–54, 2017 2018.

    Article  Google Scholar 

  25. Tian, Z., Wang, B., Zhou, Z., and Zhang, H., The research on rootkit for information system classified protection. In: 2011 International Conference on Computer Science and Service System (CSSS), 2011, 890–893.

  26. Anuar, N. B., Papadaki, M., Furnell, S., and Clarke, N., An investigation and survey of response options for intrusion response systems (IRSs). In: Proceedings of the 9th Annual Information Security South Africa Conference, 2010, 1–8.

  27. Razak, M. F. A., Anuar, N. B., Salleh, R., and Firdaus, A., The rise of ‘malware’: Bibliometric analysis of malware study. J. Netw. Comput. Appl. 75:58–76, 2016.

    Article  Google Scholar 

  28. Zin, S. M., Anuar, N. B., Kiah, M. L. M., and Pathan, A.-S. K., Routing protocol design for secure WSN: Review and open research issues. J. Netw. Comput. Appl. 41:517–530, 2014.

    Article  Google Scholar 

  29. Feizollah, A., Anuar, N. B., Salleh, R., Amalina, F., Ma’arof, R. R., and Shamshirband, S., A study of machine learning classifiers for anomaly-based mobile botnet detection. Malays. J. Comput. Sci. 26(4):251–265, 2013.

    Google Scholar 

  30. Yaakob, N., Khalil, I., Kumarage, H., Atiquzzaman, M., and Tari, Z., By-passing infected areas in wireless sensor networks using BPR. IEEE Trans. Comput. 64(6):1594–1606, 2015.

    Google Scholar 

  31. Shabtai, A., Mimran, D., Rokach, L., Shapira, B., and Elovici, Y., Mobile malware detection through analysis of deviations in application network behavior. Comput. Secur. 43:1–18, 2014.

    Article  Google Scholar 

  32. Lin, Y., Lai, Y., Chen, C., and Tsai, H., Identifying android malicious repackaged applications by thread-grained system call sequences. Comput. Secur. 39:340–350, 2013.

    Article  Google Scholar 

  33. Feizollah, A., Shamshirband, S., Anuar, N. B., Salleh, R., and Kiah, M. L. M., Anomaly detection using cooperative fuzzy logic controller. In: 16th FIRA RoboWorld Congress (FIRA), Kuala Lumpur, Malaysia, 2013, 220–231.

  34. Xie, L., Zhang, X., Seifert, J.-P., and Zhu, S., pBMDS : A behavior-based malware detection system for cellphone devices. In: 3rd ACM Conference on Wireless Network Security Location: Stevens Institute Technology, Hoboken, NJ, 2010, 37–48.

  35. Burguera, I., Zurutuza, U., and Nadjm-Tehrani, S., Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Chicago, Illinois, USA, 2011, 15–26.

  36. Feizollah, A., Anuar, N. B., Salleh, R., and Amalina, F., Comparative study of K-means and mini batch K-means clustering algorithms in android malware detection using network traffic analysis. In: International Symposium on Biometrics and Security Technologies (ISBAST), 2014.

  37. Allahham, A. A., and Rahman, M. A., A smart monitoring system for campus using Zigbee wireless sensor networks. International Journal of Software Engineering and Computer Systems (IJSECS) 4(1):1–14, 2018.

    Article  Google Scholar 

  38. Yerima, S. Y., Sezer, S., and McWilliams, G., Analysis of Bayesian classification-based approaches for android malware detection. IET Inf. Secur. 8(1):25–36, 2014.

    Article  Google Scholar 

  39. Chess, B., and McGraw, G., Static analysis for security. IEEE Security & Privacy Magazine 2(6):76–79, 2004.

    Article  Google Scholar 

  40. Sharif, M., Yegneswaran, V., Saidi, H., Porras, P., and Lee, W., Eureka: a framework for enabling static malware analysis. In: Lecture Notes in Computer Science. Vol. 5283, 2008, 481–500.

  41. Chang, T.-K., and Hwang, G.-H., The design and implementation of an application program interface for securing XML documents. J. Syst. Softw. 80(8):1362–1374, 2007.

    Article  Google Scholar 

  42. Aafer, Y., Du, W., and Yin, H., DroidAPIMiner: mining API-level features for robust malware detection in android. In: Security and Privacy in Communication Networks, 2013, 86–103.

  43. Talha, K. A., Alper, D. I., and Aydin, C., APK auditor: Permission-based android malware detection system. Digit. Investig. 13:1–14, 2015.

    Article  Google Scholar 

  44. Huang, C.-Y., Tsai, Y.-T., and Hsu, C.-H., Performance evaluation on permission-based detection for android malware. In: Proceedings of the International Computer Symposium ICS 2012 Held at Hualien, Taiwan. Vol. 21, 2012, 111–120.

  45. Sanz, B., Santos, I., Laorden, C., Ugarte-Pedrero, X., Bringas, P. G., and Alvarez, G., PUMA: permission usage to detect malware in android. In: Advances in Intelligent Systems and Computing, 2013, 289–298.

  46. Seo, S.-H., Gupta, A., Mohamed Sallam, A., Bertino, E., and Yim, K., Detecting mobile malware threats to homeland security through static analysis. J. Netw. Comput. Appl. 38:43–53, 2014.

    Article  Google Scholar 

  47. Wei, T., Lee, H., Tyan, H.-R., Liao, H. M., Jeng, A. B., and Wang, J., DroidExec: root exploit malware recognition against wide variability via folding redundant. In: 17th International Conference Advanced Communication Technology (ICACT), PyeongChang, Korea, 2015, 161–169.

  48. Anuar, N. B., Sallehudin, H., Gani, A., and Zakari, O., Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree. Malays. J. Comput. Sci. 21(2):101–115, 2008.

    Article  Google Scholar 

  49. Kotsiantis, S. B., Supervised machine learning: A review of classification techniques. Informatica 31:249–268, 2007.

    Google Scholar 

  50. Yerima, S. Y., Sezer, S., McWilliams, G., and Muttik, I., A new android malware detection approach using Bayesian classification. In: IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), Barcelona, Spain, 2013, 121–128.

  51. Peng, H. et al., Using probabilistic generative models for ranking risks of android apps. In: ACM Conference on Computer and Communications Security, (CCS), Raleigh, North Carolina, USA, 2012, 241–252.

  52. Sarma, B., Li, N., Gates, C., Potharaju, R., Nita-rotaru, C., and Molloy, I., Android permissions: a perspective combining risks and benefits. In: SACMAT ‘12 Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, New Jersey, USA, 2012, 13–22.

  53. Arp, D., Spreitzenbarth, M., Malte, H., Gascon, H., and Rieck, K., DREBIN: effective and explainable detection of android malware in your pocket. In: 21th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, 2014, 1–15.

  54. Sanz, B., Santos, I., Laorden, C., Ugarte-Pedrero, X., Nieves, J., Bringas, P. G., and Álvarez Marañón, G., Mama: Manifest analysis for malware detection in android. Cybern. Syst. 44(6–7):469–488, 2013.

    Article  Google Scholar 

  55. Shabtai, A., Fledel, Y., and Elovici, Y., Automated static code analysis for classifying android applications using machine learning. In: Ninth International Conference on Computational Intelligence and Security, Nanning, Guangxi Zhuang Autonomous Region China, 2010, 329–333.

  56. Yerima, S. Y., Sezer, S., and Muttik, I., Android malware detection using parallel machine learning classifiers. In: Eight International Conference on Next Generation Mobile Apps, Services and Technologies, (NGMAST), St. Anthony’s College of the University of Oxford, UK, 2014, 37–42.

  57. Peiravian, N., and Zhu, X., Machine learning for android malware detection using permission and API calls. In: International Conference on Tools with Artificial Intelligence (ICTAI), Herndon, VA, USA, 2013, 300–305.

  58. Sheen, S., Anitha, R., and Natarajan, V., Android based malware detection using a multifeature collaborative decision fusion approach. Neurocomputing 151:905–912, 2015.

    Article  Google Scholar 

  59. Yerima, S. Y., Sezer, S., and Muttik, I., High accuracy android malware detection using ensemble learning. IET Inf. Secur. 9(6):313–320, 2015.

    Article  Google Scholar 

  60. Apvrille, L., and Apvrille, A., Pre-filtering mobile malware with heuristic techniques. In: The 2nd International Symposium on Research in Grey-Hat Hacking (GreHack), Grenoble, France, 2013, 1–16.

  61. Wu, D.-J., Mao, C.-H., Wei, T.-E., Lee, H.-M., and Wu, K.-P., DroidMat: android malware detection through manifest and API calls tracing. In: Seventh Asia Joint Conference on Information Security, Tokyo, Japan, 2012, 62–69.

  62. Samra, A. A. A., Kangbin, Y., and Ghanem, O. A., Analysis of clustering technique in android malware detection. In: Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), Taichung, Taiwan, 2013, 729–733.

  63. Aung, Z., and Zaw, W., Permission-based android malware detection. International Journal of Scientific & Technology Research 2(3):228–234, 2013.

    Google Scholar 

  64. Cilibrasi, R., and Vitányi, P. M. B., Clustering by compression. IEEE Trans. Inf. Theory 51(4):1523–1545, 2005.

    Article  Google Scholar 

  65. Crussell, J., Gibler, C., and Chen, H., Attack of the clones: detecting cloned applications on android markets. In: Computer Security – ESORICS 2012. Lecture Notes in Computer Science. Vol. 7459, 2012, 37–54.

  66. Beverly, R., Garfinkel, S., and Cardwell, G., Forensic carving of network packets and associated data structures. Digit. Investig. 8:S78–S89, 2011.

    Article  Google Scholar 

  67. Paturi, A., Cherukuri, M., Donahue, J., and Mukkamala, S., Mobile malware visual analytics and similarities of attack toolkits. In: Collaboration Technologies and Systems (CTS), San Diego, CA, USA, 2013, 149–154.

  68. Spolaôr, N., Cherman, E. A., Monard, M. C., and Lee, H. D., A comparison of multi-label feature selection methods using the problem transformation approach. Electron. Notes Theor. Comput. Sci. 292:135–151, 2013.

    Article  Google Scholar 

  69. Razak, M. F. A., Anuar, N. B., Othman, F., Firdaus, A., Afifi, F., and Salleh, R., Bio-inspired for features optimization and malware detection. Arab. J. Sci. Eng., 2017.

  70. Kennedy, J., and Eberhart, R., Particle swarm optimization. In: IEEE International Conference on Neural Network, Perth, WA, Australia. Vol. 4, 1995, 1942–1948.

  71. Ng, W. W. Y., Zhou, X., Tian, X., Wang, X., and Yeung, D. S., Bagging-boosting-based semi-supervised multi-hashing with query-adaptive re-ranking. Neurocomputing 275:916–923, 2017.

    Article  Google Scholar 

  72. Friedman, J., Hastie, T., and Tibshirani, R., Additive logistic regression. Ann. Stat. 28(2):337–374, 2000.

    Article  Google Scholar 

  73. Webb, G. I., MultiBoosting: A technique for combining boosting and wagging. Mach. Learn. 40(2):159–196, 2000.

    Article  Google Scholar 

  74. Firdaus, A., Anuar, N. B., Razak, M. F. A., and Sangaiah, A. K., Bio-inspired computational paradigm for feature investigation and malware detection: Interactive analytics. Multimedia Tools and Applications 76(280):1–37, 2017.

    Google Scholar 

  75. Karim, A., Salleh, R., Khan, M. K., Siddiqa, A., and Choo, K.-K. R., On the analysis and detection of mobile botnet. Journal of Universal Computer Science 22(4):567–588, 2016.

    Google Scholar 

  76. Zhou, Y., and Jiang, X., Android malware genome project, 2012. [Online]. Available: http://www.malgenomeproject.org/.

  77. Zhou, Y., and Jiang, X., Dissecting android malware: characterization and evolution. In: IEEE Symposium on Security and Privacy, San Francisco, CA 2012, no. 4, 95–109.

  78. Google, Google play store, 2014. [Online]. Available: https://play.google.com/store?hl=en. [Accessed: 01-Jan-2014].

  79. VirusTotal, VirusTotal, 2016. [Online]. Available: https://www.virustotal.com/. [Accessed: 24-Aug-2016].

  80. Skylot, Jadx, 2015. [Online]. Available: https://github.com/skylot/jadx. [Accessed: 01-Feb-2014].

  81. Android Developer, Android debug bridge (ADB), 2017. [Online]. Available: http://developer.android.com/tools/help/adb.html. [Accessed: 01-Jan-2017].

  82. Tukey, J. W., Exploratory data analysis: past, present, and future, 1993.

  83. Jensen, R., and Shen, Q., Computational intelligence and feature selection: rough and fuzzy approaches. Wiley-IEEE Press, 2008.

  84. Adewole, K. S., Anuar, N. B., Kamsin, A., Varathan, K. D., and Razak, S. A., Malicious accounts: Dark of the social networks. J. Netw. Comput. Appl. 79:41–67, 2017.

    Article  Google Scholar 

  85. Firdaus, A., Anuar, N. B., Karim, A., and Razak, M. F. A., Discovering optimal features using static analysis and genetic search based method for android malware detection. Front. Inf. Technol. Electron. Eng. 9184:1–27, 2017.

    Google Scholar 

  86. Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., and Witten, I. H., The WEKA data mining software: An update. ACM SIGKDD Explorations 11(1):10–18, 2009.

    Article  Google Scholar 

  87. Williams, G., ARFF Data, 2010. [Online]. Available: http://datamining.togaware.com/survivor/ARFF_Data0.html. [Accessed: 10-Sep-2015].

  88. Technische Universität Braunschweig, The Drebin dataset, 2014. [Online]. Available: https://www.sec.cs.tu-bs.de/~danarp/drebin/. [Accessed: 01-Jan-2015].

  89. Moser, A., Kruegel, C., and Kirda, E., Limits of static analysis for malware detection. In: Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), 2007, 421–430.

  90. Louk, M., Lim, H., Lee, H., and Atiquzzaman, M., An effective framework of behavior detection- advanced static analysis for malware detection. In: International Symposium on Communications and Information Technologies (ISCIT), 2014, 361–365.

  91. Allix, K., Bissyandé, T. F., Klein, J., and Le Traon, Y., AndroZoo: collecting millions of android apps for the research community. In: MSR ‘16 Proceedings of the 13th International Conference on Mining Software Repositories, Austin, Texas, 2016, 468–471.

  92. Amin, M. R., Zaman, M., Hossain, M. S., and Atiquzzaman, M., Behavioral malware detection approaches for android. In: IEEE International Conference on Communications, ICC 2016, 2016.

  93. Enck, W., Defending users against smartphone apps: techniques and future directions. In: Proceedings of the 7th International Conference on Information Systems Security, Kolkata, India, 2011, 49–70.

  94. Zhongyang, Y., Xin, Z., Mao, B., and Xie, L., DroidAlarm: an all-sided static analysis tool for android privilege-escalation malware. In: Proceedings of Computer and Communications Security (CCS), Hangzhou, China, 2013, 353–358.

Download references

Acknowledgements

This work was supported by Universiti Malaysia Pahang, under the Grant Faculty of Computer Systems and Software Engineering (FSK1000), RDU180360.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arun Kumar Sangaiah.

Additional information

This article is part of the Topical Collection on Mobile & Wireless Health

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Firdaus, A., Anuar, N.B., Razak, M.F.A. et al. Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management. J Med Syst 42, 112 (2018). https://doi.org/10.1007/s10916-018-0966-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-018-0966-x

Keywords

Navigation