skip to main content
10.1145/3428363.3428375acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnsyssConference Proceedingsconference-collections
research-article

An Optimized Decision Tree based Android Malware Detection Approach using Machine Learning

Authors Info & Claims
Published:22 December 2020Publication History

ABSTRACT

The growing trend of attacking Android smart phones using malicious app has started posing significant threats for the users. Many approaches have been introduced for protecting the users against such malware. However, those solutions tend to use many features to get better accuracy in detecting Android malware which eventually results in higher complexity in creating machine learning based models. Hence, an effective model is required to find the most significant features resulting in a faster model yet having better accuracy. In this paper, we have proposed a robust approach to detect android malwares using only selective features that are extracted using Ranker search method and Gain Ratio attribute evaluator. We have used machine learning algorithms which include J48 Decision Tree, Random Forest and Random Tree to classify the preprocessed dataset into malware and benign. We have produced faster results using Random Tree algorithm and obtained higher accuracy using Random Forest algorithm. Further, we have measured and compared various performance metrics with respect to different numbers of attributes and different classifiers. Our proposed detection method can help users distinguish malicious applications from benign ones in a faster yet precise manner.

References

  1. A. S. M. Ahsan-Ul-Haque, Md. Shohrab Hossain, and Mohammed Atiquzzaman. 2018. Sequencing System Calls for Effective Malware Detection in Android. In IEEE GLOBECOM. IEEE, Abu Dhabi, UAE.Google ScholarGoogle Scholar
  2. Mohammed S. Alam and Son T. Vuong. 2013. Random Forest Classification for Detecting Android Malware. In IEEE International Conference on Green Computing and Communications. IEEE, Beijing, China, 663–669.Google ScholarGoogle Scholar
  3. Jehad Ali, Rehanullah Khan, Nasir Ahmad, and Imran Maqsood. 2012. Random forests and decision trees. International Journal of Computer Science Issues (IJCSI) 9, 5(2012), 272.Google ScholarGoogle Scholar
  4. Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, and Konrad Rieck. 2014. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket. In NDSS, Vol. 14. The Internet Society, San Diego, CA, USA, 23–26.Google ScholarGoogle Scholar
  5. Md. Ishtiaq Ashiq, Protick Bhowmick, Md. Shohrab Hossain, and Husnu S. Narman. 2019. Domain Flux based DGA Botnet Detection Using Feedforward Neural Network. In IEEE Military Communications (MILCOM). IEEE, Norfolk, VA, USA.Google ScholarGoogle Scholar
  6. Bradley Barth. 2018. New Desert Scorpion spyware found in malicious chat app aimed at Palestinians. Retrieved October 7, 2020 from https:/www.scmagazine.com/home/security-news/rsa-2018/new-desert-scorpion-spyware-found-in-malicious-chat-app-aimed-at-palestinians/Google ScholarGoogle Scholar
  7. Leo Breiman. 2001. Random forests. Machine learning 45, 1 (2001), 5–32.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Sam Drazin and Matt Montag. 2012. Decision Tree Analysis using Weka. In Machine Learning-Project II, University of Miami. Miami, Florida, USA.Google ScholarGoogle Scholar
  9. Mainuddin Ahmad Jonas, Risul Islam, Md. Shohrab Hossain, Husnu S. Narman, and M. Atiquzzaman. 2019. An Intelligent System for Preventing SSL Stripping-based Session Hijacking Attacks. In IEEE Military Communications (MILCOM). IEEE, Norfolk, VA, USA.Google ScholarGoogle Scholar
  10. Asha Gowda Karegowda, AS Manjunath, and MA Jayaram. 2010. Comparative study of attribute selection using gain ratio and correlation based feature selection. International Journal of Information Technology and Knowledge Management 2, 2 (2010), 271–277.Google ScholarGoogle Scholar
  11. J. Li, L. Sun, Q. Yan, Z. Li, W. Srisa-an, and H. Ye. 2018. Significant Permission Identification for Machine-Learning-Based Android Malware Detection. IEEE Transactions on Industrial Informatics 14, 7 (July 2018), 3216–3225.Google ScholarGoogle ScholarCross RefCross Ref
  12. Nikola Milosevic, Ali Dehghantanha, and Kim-Kwang Raymond Choo. 2017. Machine learning aided Android malware classification. Computers & Electrical Engineering 61 (2017), 266 – 274.Google ScholarGoogle ScholarCross RefCross Ref
  13. Vinod P., Akka Zemmari, and Mauro Conti. 2019. A machine learning based approach to detect malicious Android apps using discriminant system calls. Future Generation Computer Systems 94 (2019), 333 – 350.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. J. R. Quinlan. 1986. Induction of Decision Trees. Machine Learning 1(1986), 81–106.Google ScholarGoogle ScholarCross RefCross Ref
  15. Zahoor Ur Rehman, Sidra Nasim Khan, Khan Muhammad, Jong Weon Lee, Zhihan Lv, Sung Wook Baik, Peer Azmat Shah, Khalid Awan, and Irfan Mehmood. 2018. Machine learning-assisted signature and heuristic-based detection of malwares in Android devices. Computers & Electrical Engineering 69 (2018), 828 – 841.Google ScholarGoogle ScholarCross RefCross Ref
  16. Aiman Ahmad Abu Samra, Hasan N Qunoo, Fatma Al-Rubaie, and Haneen El-Talli. 2019. A survey of static android malware detection techniques. In 7th Palestinian International Conference on Electrical and Computer Engineering (PICECE). IEEE, Gaza, Palestine, 1–6.Google ScholarGoogle Scholar
  17. Ian H. Witten, Eibe Frank, Mark A. Hall, and Christopher J. Pal. 2016. Data Mining, Fourth Edition: Practical Machine Learning Tools and Techniques (4th ed.). Morgan Kaufmann Publishers Inc., San Francisco, CA, USA.Google ScholarGoogle Scholar
  18. Dong Jie Wu, Ching Hao Mao, Te En Wei, Hahn Ming Lee, and Kuo Ping Wu. 2012. DroidMat: Android Malware Detection through Manifest and API Calls Tracing. In Seventh Asia Joint Conference on Information Security. IEEE, Tokyo, Japan, 62–69.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. S. Y. Yerima, S. Sezer, G. McWilliams, and I. Muttik. 2013. A New Android Malware Detection Approach Using Bayesian Classification. In IEEE 27th International Conference on Advanced Information Networking and Applications (AINA). IEEE, Barcelona, Spain, 121–128.Google ScholarGoogle Scholar
  20. Suleiman Y. Yerima, Sakir Sezer, and Igor Muttik. 2014. Android Malware Detection Using Parallel Machine Learning Classifiers. In Eighth International Conference on Next Generation Mobile Applications, Services and Technologies. IEEE, Oxford, UK, 37–42.Google ScholarGoogle Scholar
  21. Mehedee Zaman, Mohammad Rakib Amin, Md. Shohrab Hossain, and Mohammed Atiquzzaman. 2016. Behavioral Malware Detection Approaches for Android. In IEEE ICC. IEEE, Kuala Lumpur, Malaysia.Google ScholarGoogle Scholar
  22. Yanxin Zhang, Yulei Sui, Shirui Pan, Zheng Zheng, Baodi Ning, Ivor Tsang, and Wanlei Zhou. 2019. Familial clustering For weakly-labeled Android malware using hybrid representation learning. IEEE Transactions on Information Forensics and Security 15 (2019), 3401–3414.Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    NSysS '20: Proceedings of the 7th International Conference on Networking, Systems and Security
    December 2020
    132 pages
    ISBN:9781450389051
    DOI:10.1145/3428363

    Copyright © 2020 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 22 December 2020

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate12of44submissions,27%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format