A Client/Server Malware Detection Model Based on Machine Learning for Android Devices

被引:6
作者
Fournier, Arthur [1 ]
El Khoury, Franjieh [1 ]
Pierre, Samuel [1 ]
机构
[1] Polytech Montreal, Dept Comp & Software Engn, Mobile Comp & Networking Res Lab LARIM, Montreal, PQ H3T 1J4, Canada
来源
IOT | 2021年 / 2卷 / 03期
基金
加拿大自然科学与工程研究理事会;
关键词
Android devices; mobile malware; mobile applications; malware detection; client/server architecture; offloading; prediction; classification; regression;
D O I
10.3390/iot2030019
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The rapid adoption of Android devices comes with the growing prevalence of mobile malware, which leads to serious threats to mobile phone security and attacks private information on mobile devices. In this paper, we designed and implemented a model for malware detection on Android devices to protect private and financial information, for the mobile applications of the ATISCOM project. This model is based on client/server architecture, to reduce the heavy computations on a mobile device by sending data from the mobile device to the server for remote processing (i.e., offloading) of the predictions. We then gradually optimized our proposed model for better classification of the newly installed applications on Android devices. We at first adopted Naive Bayes to build the model with 92.4486% accuracy, then the classification method that gave the best accuracy of 93.85% for stochastic gradient descent (SGD) with binary class (i.e., malware and benign), and finally the regression method with numerical values ranging from -100 to 100 to manage the uncertainty predictions. Therefore, our proposed model with random forest regression gives a good accuracy in terms of performance, with a good correlation coefficient, minimum computation time and the smallest number of errors for malware detection.
引用
收藏
页码:355 / 374
页数:20
相关论文
共 42 条
[1]  
Ahmadi M, 2018, Arxiv, DOI arXiv:1802.01185
[2]   Detection of Potentially Compromised Computer Nodes and Clusters Connected on a Smart Grid, Using Power Consumption Data [J].
Almshari, Mohammed ;
Tsaramirsis, Georgios ;
Khadidos, Adil Omar ;
Buhari, Seyed Mohammed ;
Khan, Fazal Qudus ;
Khadidos, Alaa Omar .
SENSORS, 2020, 20 (18) :1-16
[3]  
Alzaylaee MK, 2017, PROCEEDINGS OF THE 3RD ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, IWSPA 2017, P65, DOI 10.1145/3041008.3041010
[4]  
Android, Source Android Runtime (ART) and Dalvik
[5]  
[Anonymous], 2020, Machine Learning Crash Course
[6]  
[Anonymous], About Us
[7]  
[Anonymous], Developers Documentation: Manifest. Permissions
[8]   Low-Resource Footprint, Data-Driven Malware Detection on Android [J].
Aonzo, Simone ;
Merlo, Alessio ;
Migliardi, Mauro ;
Oneto, Luca ;
Palmieri, Francesco .
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2020, 5 (02) :213-222
[9]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[10]   SAMADroid: A Novel 3-Level Hybrid Malware Detection Model for Android Operating System [J].
Arshad, Saba ;
Shah, Munam A. ;
Wahid, Abdul ;
Mehmood, Amjad ;
Song, Houbing ;
Yu, Hongnian .
IEEE ACCESS, 2018, 6 :4321-4339