ABSTRACT
The growing trend of attacking Android smart phones using malicious app has started posing significant threats for the users. Many approaches have been introduced for protecting the users against such malware. However, those solutions tend to use many features to get better accuracy in detecting Android malware which eventually results in higher complexity in creating machine learning based models. Hence, an effective model is required to find the most significant features resulting in a faster model yet having better accuracy. In this paper, we have proposed a robust approach to detect android malwares using only selective features that are extracted using Ranker search method and Gain Ratio attribute evaluator. We have used machine learning algorithms which include J48 Decision Tree, Random Forest and Random Tree to classify the preprocessed dataset into malware and benign. We have produced faster results using Random Tree algorithm and obtained higher accuracy using Random Forest algorithm. Further, we have measured and compared various performance metrics with respect to different numbers of attributes and different classifiers. Our proposed detection method can help users distinguish malicious applications from benign ones in a faster yet precise manner.
- A. S. M. Ahsan-Ul-Haque, Md. Shohrab Hossain, and Mohammed Atiquzzaman. 2018. Sequencing System Calls for Effective Malware Detection in Android. In IEEE GLOBECOM. IEEE, Abu Dhabi, UAE.Google Scholar
- Mohammed S. Alam and Son T. Vuong. 2013. Random Forest Classification for Detecting Android Malware. In IEEE International Conference on Green Computing and Communications. IEEE, Beijing, China, 663–669.Google Scholar
- Jehad Ali, Rehanullah Khan, Nasir Ahmad, and Imran Maqsood. 2012. Random forests and decision trees. International Journal of Computer Science Issues (IJCSI) 9, 5(2012), 272.Google Scholar
- Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, and Konrad Rieck. 2014. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket. In NDSS, Vol. 14. The Internet Society, San Diego, CA, USA, 23–26.Google Scholar
- Md. Ishtiaq Ashiq, Protick Bhowmick, Md. Shohrab Hossain, and Husnu S. Narman. 2019. Domain Flux based DGA Botnet Detection Using Feedforward Neural Network. In IEEE Military Communications (MILCOM). IEEE, Norfolk, VA, USA.Google Scholar
- Bradley Barth. 2018. New Desert Scorpion spyware found in malicious chat app aimed at Palestinians. Retrieved October 7, 2020 from https:/www.scmagazine.com/home/security-news/rsa-2018/new-desert-scorpion-spyware-found-in-malicious-chat-app-aimed-at-palestinians/Google Scholar
- Leo Breiman. 2001. Random forests. Machine learning 45, 1 (2001), 5–32.Google ScholarDigital Library
- Sam Drazin and Matt Montag. 2012. Decision Tree Analysis using Weka. In Machine Learning-Project II, University of Miami. Miami, Florida, USA.Google Scholar
- Mainuddin Ahmad Jonas, Risul Islam, Md. Shohrab Hossain, Husnu S. Narman, and M. Atiquzzaman. 2019. An Intelligent System for Preventing SSL Stripping-based Session Hijacking Attacks. In IEEE Military Communications (MILCOM). IEEE, Norfolk, VA, USA.Google Scholar
- Asha Gowda Karegowda, AS Manjunath, and MA Jayaram. 2010. Comparative study of attribute selection using gain ratio and correlation based feature selection. International Journal of Information Technology and Knowledge Management 2, 2 (2010), 271–277.Google Scholar
- J. Li, L. Sun, Q. Yan, Z. Li, W. Srisa-an, and H. Ye. 2018. Significant Permission Identification for Machine-Learning-Based Android Malware Detection. IEEE Transactions on Industrial Informatics 14, 7 (July 2018), 3216–3225.Google ScholarCross Ref
- Nikola Milosevic, Ali Dehghantanha, and Kim-Kwang Raymond Choo. 2017. Machine learning aided Android malware classification. Computers & Electrical Engineering 61 (2017), 266 – 274.Google ScholarCross Ref
- Vinod P., Akka Zemmari, and Mauro Conti. 2019. A machine learning based approach to detect malicious Android apps using discriminant system calls. Future Generation Computer Systems 94 (2019), 333 – 350.Google ScholarDigital Library
- J. R. Quinlan. 1986. Induction of Decision Trees. Machine Learning 1(1986), 81–106.Google ScholarCross Ref
- Zahoor Ur Rehman, Sidra Nasim Khan, Khan Muhammad, Jong Weon Lee, Zhihan Lv, Sung Wook Baik, Peer Azmat Shah, Khalid Awan, and Irfan Mehmood. 2018. Machine learning-assisted signature and heuristic-based detection of malwares in Android devices. Computers & Electrical Engineering 69 (2018), 828 – 841.Google ScholarCross Ref
- Aiman Ahmad Abu Samra, Hasan N Qunoo, Fatma Al-Rubaie, and Haneen El-Talli. 2019. A survey of static android malware detection techniques. In 7th Palestinian International Conference on Electrical and Computer Engineering (PICECE). IEEE, Gaza, Palestine, 1–6.Google Scholar
- Ian H. Witten, Eibe Frank, Mark A. Hall, and Christopher J. Pal. 2016. Data Mining, Fourth Edition: Practical Machine Learning Tools and Techniques (4th ed.). Morgan Kaufmann Publishers Inc., San Francisco, CA, USA.Google Scholar
- Dong Jie Wu, Ching Hao Mao, Te En Wei, Hahn Ming Lee, and Kuo Ping Wu. 2012. DroidMat: Android Malware Detection through Manifest and API Calls Tracing. In Seventh Asia Joint Conference on Information Security. IEEE, Tokyo, Japan, 62–69.Google ScholarDigital Library
- S. Y. Yerima, S. Sezer, G. McWilliams, and I. Muttik. 2013. A New Android Malware Detection Approach Using Bayesian Classification. In IEEE 27th International Conference on Advanced Information Networking and Applications (AINA). IEEE, Barcelona, Spain, 121–128.Google Scholar
- Suleiman Y. Yerima, Sakir Sezer, and Igor Muttik. 2014. Android Malware Detection Using Parallel Machine Learning Classifiers. In Eighth International Conference on Next Generation Mobile Applications, Services and Technologies. IEEE, Oxford, UK, 37–42.Google Scholar
- Mehedee Zaman, Mohammad Rakib Amin, Md. Shohrab Hossain, and Mohammed Atiquzzaman. 2016. Behavioral Malware Detection Approaches for Android. In IEEE ICC. IEEE, Kuala Lumpur, Malaysia.Google Scholar
- Yanxin Zhang, Yulei Sui, Shirui Pan, Zheng Zheng, Baodi Ning, Ivor Tsang, and Wanlei Zhou. 2019. Familial clustering For weakly-labeled Android malware using hybrid representation learning. IEEE Transactions on Information Forensics and Security 15 (2019), 3401–3414.Google ScholarCross Ref
Recommendations
Smart malware detection on Android
Nowadays, because of its increased popularity, Android is target to a growing number of attacks and malicious applications, with the purpose of stealing private information and consuming credit by subscribing to premium services. Most of the current ...
Effectiveness of Android Obfuscation on Evading Anti-malware
CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and PrivacyObfuscation techniques have been conventionally used for legitimate applications, including preventing application reverse engineering, tampering and protecting intellectual property. A malware author could also leverage these benign techniques to hide ...
Evaluating Machine Learning Models for Android Malware Detection: A Comparison Study
ICNCC '18: Proceedings of the 2018 VII International Conference on Network, Communication and ComputingAndroid is the most popular mobile operating system having billions of active users worldwide that attracted advertisers, hackers, and cybercriminals to develop malware for various purposes. In recent years, wide-ranging researches have been conducted ...
Comments