Detection of Anomalous Behavior of Smartphone Devices using Changepoint Analysis and Machine Learning Techniques

被引:1
|
作者
Sanchez, Ricardo Alejandro Manzano [1 ]
Naik, Kshirasagar [1 ]
Albasir, Abdurhman [1 ]
Zaman, Marzia [2 ]
Goel, Nishith [2 ]
机构
[1] Univ Waterloo, 200 Univ Ave, Waterloo, ON N2L 3G1, Canada
[2] Cistel Technol Inc, 30 Concourse Gate, Nepean, ON, Canada
来源
DIGITAL THREATS: RESEARCH AND PRACTICE | 2023年 / 4卷 / 01期
关键词
Malware detection; non-parametric and parametric changepoint detection; power measurement; time-series; machine learning; Drebin dataset; ANDROID MALWARE DETECTION; ENERGY-CONSUMPTION;
D O I
10.1145/3492327
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Detecting anomalous behavior on smartphones is challenging sincemalware evolution. Othermethodologies detect malicious behavior by analyzing static features of the application code or dynamic data samples obtained from hardware or software. Static analysis is prone to code's obfuscation while dynamic needs that malicious activities to cease to be dormant in the shortest possible time while data samples are collected. Triggering and capturing malicious behavior in data samples in dynamic analysis is challenging since we need to generate an efficient combination of user's inputs to trigger these malicious activities. We propose a general model which uses a data collector and analyzer to unveil malicious behavior by analyzing the device's power consumption since this summarizes the changes in software. The data collector uses an automated tool to generate user inputs. The data analyzer uses changepoint analysis to extract features from power consumption and machine learning techniques to train these features. The data analyzer stage contains two methodologies that extract features using parametric and non-parametric changepoint. Our methodologies are efficient in data collection time than a manual method and the data analyzer provides higher accuracy compared to other techniques, reaching over 94% F1-measure for emulated and real malware.
引用
收藏
页数:28
相关论文
共 50 条
  • [41] Android Ransomware Detection using Machine Learning Techniques: A Comparative Analysis on GPU and CPU
    Sharma, Shweta
    Krishna, C. Rama
    Kumar, Rakesh
    2020 21ST INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT), 2020,
  • [42] Analysis of Machine Learning Algorithms for Anomaly Detection on Edge Devices
    Huc, Aleks
    Salej, Jakob
    Trebar, Mira
    SENSORS, 2021, 21 (14)
  • [43] Two-Stage Ransomware Detection Using Dynamic Analysis and Machine Learning Techniques
    Jinsoo Hwang
    Jeankyung Kim
    Seunghwan Lee
    Kichang Kim
    Wireless Personal Communications, 2020, 112 : 2597 - 2609
  • [44] Analysis and Detection of DDoS Attacks on Cloud Computing Environment using Machine Learning Techniques
    Wani, Abdul Raoof
    Rana, Q. P.
    Saxena, U.
    Pandey, Nitin
    PROCEEDINGS 2019 AMITY INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AICAI), 2019, : 870 - 875
  • [46] URL Phishing Detection using Machine Learning Techniques based on URLs Lexical Analysis
    Abutaha, Mohammed
    Ababneh, Mohammad
    Mahmoud, Khaled
    Baddar, Sherenaz Al-Haj
    2021 12TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2021, : 147 - 152
  • [47] Android Ransomware Detection Using Supervised Machine Learning Techniques Based on Traffic Analysis
    Albin Ahmed, Amnah
    Shaahid, Afrah
    Alnasser, Fatima
    Alfaddagh, Shahad
    Binagag, Shadha
    Alqahtani, Deemah
    SENSORS, 2024, 24 (01)
  • [48] Analysis of Ransomware Impact on Android Systems using Machine Learning Techniques
    Al-Ruwili, Anfal Sayer M.
    Mostafa, Ayman Mohamed
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (11) : 775 - 785
  • [49] Assessment of Blood Pressure Using Only a Smartphone and Machine Learning Techniques: A Systematic Review
    Haugg, Fridolin
    Elgendi, Mohamed
    Menon, Carlo
    FRONTIERS IN CARDIOVASCULAR MEDICINE, 2022, 9
  • [50] Two-Stage Ransomware Detection Using Dynamic Analysis and Machine Learning Techniques
    Hwang, Jinsoo
    Kim, Jeankyung
    Lee, Seunghwan
    Kim, Kichang
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 112 (04) : 2597 - 2609