ABSTRACT
The across the board reception of android devices and their ability to get to critical private and secret data have brought about these devices being focused by malware engineers. Existing android malware analysis techniques categorized into static and dynamic analysis. In this paper, we introduce two machine learning supported methodologies for static analysis of android malware. The First approach based on statically analysis, content is found through probability statistics which reduces the uncertainty of information. Feature extraction were proposed based on the analysis of existing dataset. Our both approaches were used to high-dimension data into low-dimensional data so as to reduce the dimension and the uncertainty of the extracted features. In training phase the complexity was reduced 16.7% of the original time and detect the unknown malware families were improved.
- Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K. and Siemens, C.E.R.T., 2014, February. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket. In NDSS.Google Scholar
- Bloom, B.H., 1970. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7), pp. 422--426. Google ScholarDigital Library
- Buennemeyer, T.K., Nelson, T.M., Clagett, L.M., Dunning, J.P., Marchany, R.C. and Tront, J.G., 2008, January. Mobile device profiling and intrusion detection using smart batteries. In Hawaii International Conference on System Sciences, Proceedings of the 41st Annual (pp. 296--296). IEEE. Google ScholarDigital Library
- Burguera, I., Zurutuza, U. and Nadjm-Tehrani, S., 2011, October. Crowdroid: behavior-based malware detection system for android. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices (pp. 15--26). ACM. Google ScholarDigital Library
- Analytics, S., 2016. Android Captures Record 85 Percent Share of Global Smartphone Shipments in Q2 2016. Online}.Google Scholar
- Canfora, G., Mercaldo, F. and Visaggio, C.A., 2015, July. Mobile malware detection using op-code frequency histograms. In e-Business and Telecommunications (ICETE), 2015 12th International Joint Conference on (Vol. 4, pp. 27--38). IEEE. Google ScholarDigital Library
- Corman, T.H., Leiserson, C.E., Rivet, R.L. and Stein, C., 2009. Introduction to Algorithms, 3rd-edition. Google ScholarDigital Library
- Damshenas, M., Dehghantanha, A., Choo, K.K.R. and Mahmud, R., 2015. M0droid: An android behavioral-based malware detection model. Journal of Information Privacy and Security, 11(3), pp. 141--157.Google ScholarCross Ref
- Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.G., Cox, L.P., Jung, J., McDaniel, P. and Sheth, A.N., 2014. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems (TOCS), 32(2), p.5. Google ScholarDigital Library
- Enck, W., Ongtang, M. and McDaniel, P., 2009, November. On lightweight mobile phone application certification. In Proceedings of the 16th ACM conference on Computer and communications security (pp. 235--245). ACM. Google ScholarDigital Library
- Fan, R.E., Chang, K.W., Hsieh, C.J., Wang, X.R. and Lin, C.J., 2008. LIBLINEAR: A library for large linear classification. Journal of machine learning research, 9(Aug), pp. 1871--1874. Google ScholarDigital Library
- Felt, A.P., Chin, E., Hanna, S., Song, D. and Wagner, D., 2011, October. Android permissions demystified. In Proceedings of the 18th ACM conference on Computer and communications security (pp. 627--638). ACM. Google ScholarDigital Library
- Grace, M., Zhou, Y., Zhang, Q., Zou, S. and Jiang, X., 2012, June. Riskranker: scalable and accurate zero-day android malware detection. In Proceedings of the 10th international conference on Mobile systems, applications, and services (pp. 281--294). ACM. Google ScholarDigital Library
- Kim, J., Choi, H., Namkung, H., Choi, W., Choi, B., Hong, H., Kim, Y., Lee, J. and Han, D., 2016, November. Enabling Automatic Protocol Behavior Analysis for Android Applications. In CoNEXT (pp. 281--295). Google ScholarDigital Library
- Schmidt, A.D., Clausen, J.H., Camtepe, A. and Albayrak, S., 2009, October. Detecting symbian os malware through static function call analysis. In Malicious and Unwanted Software (MALWARE), 2009 4th International Conference on (pp. 15--22). IEEE.Google Scholar
- Sheen, S., Anitha, R. and Natarajan, V., 2015. Android based malware detection using a multifeature collaborative decision fusion approach. Neurocomputing, 151, pp. 905--912.Google ScholarCross Ref
- Walls, J. and Choo, K.K.R., 2015, August. A Review of Free Cloud-Based Anti-Malware Apps for Android. In Trustcom/BigDataSE/ISPA, 2015 IEEE (Vol. 1, pp. 1053--1058). IEEE. Google ScholarDigital Library
- Yuan, Z., Lu, Y., Wang, Z. and Xue, Y., 2014, August. Droid-Sec: deep learning in android malware detection. In ACM SIGCOMM Computer Communication Review (Vol. 44, No. 4, pp. 371--372). ACM. Google ScholarDigital Library
- Zhou, Y. and Jiang, X., 2012, May. Dissecting android malware: Characterization and evolution. In Security and Privacy (SP), 2012 IEEE Symposium on (pp. 95--109). IEEE. Google ScholarDigital Library
Index Terms
- Effective and Explainable Detection of Android Malware Based on Machine Learning Algorithms
Recommendations
Lightweight, Obfuscation-Resilient Detection and Family Identification of Android Malware
The number of malicious Android apps is increasing rapidly. Android malware can damage or alter other files or settings, install additional applications, and so on. To determine such behaviors, a security analyst can significantly benefit from ...
Machine-Learning based analysis and classification of Android malware signatures
AbstractMulti-scanner Antivirus (AV) systems are often used for detecting Android malware since the same piece of software can be checked against multiple different AV engines. However, in many cases the same software application is flagged as ...
Highlights- Analysis and Normalization of more than 250k Android related multi-scanner malware signatures using SignatureMiner.
Permission based malware detection in android devices
SCA '18: Proceedings of the 3rd International Conference on Smart City ApplicationsThe mobile operation system Android is one of the most OS's used in the entire world, which make it the target of many malware projects and the mission of detecting those malware applications is getting harder over time due to evaluation and development ...
Comments