Detection of Anomalous Behavior of Smartphone Devices using Changepoint Analysis and Machine Learning Techniques

被引:1
|
作者
Sanchez, Ricardo Alejandro Manzano [1 ]
Naik, Kshirasagar [1 ]
Albasir, Abdurhman [1 ]
Zaman, Marzia [2 ]
Goel, Nishith [2 ]
机构
[1] Univ Waterloo, 200 Univ Ave, Waterloo, ON N2L 3G1, Canada
[2] Cistel Technol Inc, 30 Concourse Gate, Nepean, ON, Canada
来源
DIGITAL THREATS: RESEARCH AND PRACTICE | 2023年 / 4卷 / 01期
关键词
Malware detection; non-parametric and parametric changepoint detection; power measurement; time-series; machine learning; Drebin dataset; ANDROID MALWARE DETECTION; ENERGY-CONSUMPTION;
D O I
10.1145/3492327
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Detecting anomalous behavior on smartphones is challenging sincemalware evolution. Othermethodologies detect malicious behavior by analyzing static features of the application code or dynamic data samples obtained from hardware or software. Static analysis is prone to code's obfuscation while dynamic needs that malicious activities to cease to be dormant in the shortest possible time while data samples are collected. Triggering and capturing malicious behavior in data samples in dynamic analysis is challenging since we need to generate an efficient combination of user's inputs to trigger these malicious activities. We propose a general model which uses a data collector and analyzer to unveil malicious behavior by analyzing the device's power consumption since this summarizes the changes in software. The data collector uses an automated tool to generate user inputs. The data analyzer uses changepoint analysis to extract features from power consumption and machine learning techniques to train these features. The data analyzer stage contains two methodologies that extract features using parametric and non-parametric changepoint. Our methodologies are efficient in data collection time than a manual method and the data analyzer provides higher accuracy compared to other techniques, reaching over 94% F1-measure for emulated and real malware.
引用
收藏
页数:28
相关论文
共 50 条
  • [31] A Comparative Analysis of Machine Learning Techniques for Botnet Detection
    Bansal, Ankit
    Mahapatra, Sudipta
    SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 91 - 98
  • [32] Performance Analysis of Machine Learning Techniques in Intrusion Detection
    Tungjaturasopon, Praiya
    Piromsopa, Krerk
    PROCEEDINGS OF 2018 VII INTERNATIONAL CONFERENCE ON NETWORK, COMMUNICATION AND COMPUTING (ICNCC 2018), 2018, : 6 - 10
  • [33] SQL Injection Detection Using Machine Learning Techniques
    Hosam, Eman
    Hosny, Hagar
    Ashraf, Walaa
    Kaseb, Ahmed S.
    2021 8TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING & MACHINE INTELLIGENCE (ISCMI 2021), 2021, : 15 - 20
  • [34] DDoS Detection in SDN using Machine Learning Techniques
    Nadeem, Muhammad Waqas
    Goh, Hock Guan
    Ponnusamy, Vasaki
    Aun, Yichiet
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (01): : 771 - 789
  • [35] Design Pattern Detection using Machine Learning Techniques
    Chaturvedi, Shivam
    Chaturvedi, Amrita
    Tiwari, Anurag
    Agarwal, Shalini
    2018 7TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO) (ICRITO), 2018, : 246 - 251
  • [36] Analysis and prediction of erosion behavior of epoxy composites using statistical and machine learning techniques
    Mahapatra, Sourav Kumar
    Satapathy, Alok
    PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART E-JOURNAL OF PROCESS MECHANICAL ENGINEERING, 2024,
  • [37] Dynamic Permissions based Android Malware Detection using Machine Learning Techniques
    Mahindru, Arvind
    Singh, Paramvir
    PROCEEDINGS OF THE 10TH INNOVATIONS IN SOFTWARE ENGINEERING CONFERENCE, 2017, : 202 - 210
  • [38] Optimizing Power Management in IoT Devices Using Machine Learning Techniques
    Pandey, Arvind Kumar
    Selvakumar, V.
    Lavanya, P.
    Prabha, S. Lakshmi
    Mageshwari, S. Uma
    Naidu, K. Bapayya
    Srivastava, Rachna
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (05) : 2929 - 2940
  • [39] Analysis of Optimized Machine Learning and Deep Learning Techniques for Spam Detection
    Hossain, Fahima
    Uddin, Mohammed Nasir
    Halder, Rajib Kumar
    2021 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS), 2021, : 552 - 558
  • [40] Android Collusion Detection by means of Audio Signal Analysis with Machine Learning techniques
    Casolare, Rosangela
    Di Giacomo, Umberto
    Martinelli, Fabio
    Mercaldo, Francesco
    Santone, Antonella
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KSE 2021), 2021, 192 : 2340 - 2346