skip to main content
10.1145/3194452.3194465acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccaiConference Proceedingsconference-collections
research-article

Effective and Explainable Detection of Android Malware Based on Machine Learning Algorithms

Authors Info & Claims
Published:12 March 2018Publication History

ABSTRACT

The across the board reception of android devices and their ability to get to critical private and secret data have brought about these devices being focused by malware engineers. Existing android malware analysis techniques categorized into static and dynamic analysis. In this paper, we introduce two machine learning supported methodologies for static analysis of android malware. The First approach based on statically analysis, content is found through probability statistics which reduces the uncertainty of information. Feature extraction were proposed based on the analysis of existing dataset. Our both approaches were used to high-dimension data into low-dimensional data so as to reduce the dimension and the uncertainty of the extracted features. In training phase the complexity was reduced 16.7% of the original time and detect the unknown malware families were improved.

References

  1. Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K. and Siemens, C.E.R.T., 2014, February. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket. In NDSS.Google ScholarGoogle Scholar
  2. Bloom, B.H., 1970. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7), pp. 422--426. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Buennemeyer, T.K., Nelson, T.M., Clagett, L.M., Dunning, J.P., Marchany, R.C. and Tront, J.G., 2008, January. Mobile device profiling and intrusion detection using smart batteries. In Hawaii International Conference on System Sciences, Proceedings of the 41st Annual (pp. 296--296). IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Burguera, I., Zurutuza, U. and Nadjm-Tehrani, S., 2011, October. Crowdroid: behavior-based malware detection system for android. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices (pp. 15--26). ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Analytics, S., 2016. Android Captures Record 85 Percent Share of Global Smartphone Shipments in Q2 2016. Online}.Google ScholarGoogle Scholar
  6. Canfora, G., Mercaldo, F. and Visaggio, C.A., 2015, July. Mobile malware detection using op-code frequency histograms. In e-Business and Telecommunications (ICETE), 2015 12th International Joint Conference on (Vol. 4, pp. 27--38). IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Corman, T.H., Leiserson, C.E., Rivet, R.L. and Stein, C., 2009. Introduction to Algorithms, 3rd-edition. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Damshenas, M., Dehghantanha, A., Choo, K.K.R. and Mahmud, R., 2015. M0droid: An android behavioral-based malware detection model. Journal of Information Privacy and Security, 11(3), pp. 141--157.Google ScholarGoogle ScholarCross RefCross Ref
  9. Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.G., Cox, L.P., Jung, J., McDaniel, P. and Sheth, A.N., 2014. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems (TOCS), 32(2), p.5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Enck, W., Ongtang, M. and McDaniel, P., 2009, November. On lightweight mobile phone application certification. In Proceedings of the 16th ACM conference on Computer and communications security (pp. 235--245). ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Fan, R.E., Chang, K.W., Hsieh, C.J., Wang, X.R. and Lin, C.J., 2008. LIBLINEAR: A library for large linear classification. Journal of machine learning research, 9(Aug), pp. 1871--1874. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Felt, A.P., Chin, E., Hanna, S., Song, D. and Wagner, D., 2011, October. Android permissions demystified. In Proceedings of the 18th ACM conference on Computer and communications security (pp. 627--638). ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Grace, M., Zhou, Y., Zhang, Q., Zou, S. and Jiang, X., 2012, June. Riskranker: scalable and accurate zero-day android malware detection. In Proceedings of the 10th international conference on Mobile systems, applications, and services (pp. 281--294). ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Kim, J., Choi, H., Namkung, H., Choi, W., Choi, B., Hong, H., Kim, Y., Lee, J. and Han, D., 2016, November. Enabling Automatic Protocol Behavior Analysis for Android Applications. In CoNEXT (pp. 281--295). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Schmidt, A.D., Clausen, J.H., Camtepe, A. and Albayrak, S., 2009, October. Detecting symbian os malware through static function call analysis. In Malicious and Unwanted Software (MALWARE), 2009 4th International Conference on (pp. 15--22). IEEE.Google ScholarGoogle Scholar
  16. Sheen, S., Anitha, R. and Natarajan, V., 2015. Android based malware detection using a multifeature collaborative decision fusion approach. Neurocomputing, 151, pp. 905--912.Google ScholarGoogle ScholarCross RefCross Ref
  17. Walls, J. and Choo, K.K.R., 2015, August. A Review of Free Cloud-Based Anti-Malware Apps for Android. In Trustcom/BigDataSE/ISPA, 2015 IEEE (Vol. 1, pp. 1053--1058). IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Yuan, Z., Lu, Y., Wang, Z. and Xue, Y., 2014, August. Droid-Sec: deep learning in android malware detection. In ACM SIGCOMM Computer Communication Review (Vol. 44, No. 4, pp. 371--372). ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Zhou, Y. and Jiang, X., 2012, May. Dissecting android malware: Characterization and evolution. In Security and Privacy (SP), 2012 IEEE Symposium on (pp. 95--109). IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Effective and Explainable Detection of Android Malware Based on Machine Learning Algorithms

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICCAI '18: Proceedings of the 2018 International Conference on Computing and Artificial Intelligence
      March 2018
      156 pages
      ISBN:9781450364195
      DOI:10.1145/3194452

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 12 March 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader