Behavioral Analysis of Android Riskware Families Using Clustering and Explainable Machine Learning

被引:0
作者
Alani, Mohammed M. [1 ]
Alawida, Moatsum [2 ]
机构
[1] Rochester Inst Technol RIT Dubai, Dept Elect Engn & Comp Sci, POB 341055, Dubai, U Arab Emirates
[2] Abu Dhabi Univ, Dept Comp Sci, POB 59911, Abu Dhabi, U Arab Emirates
关键词
android; malware; riskware; behavioral analysis; explainable machine learning; XAI; MALWARE DETECTION;
D O I
10.3390/bdcc8120171
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Android operating system has become increasingly popular, not only on mobile phones but also in various other platforms such as Internet-of-Things devices, tablet computers, and wearable devices. Due to its open-source nature and significant market share, Android poses an attractive target for malicious actors. One of the notable security challenges associated with this operating system is riskware. Riskware refers to applications that may pose a security threat due to their vulnerability and potential for misuse. Although riskware constitutes a considerable portion of Android's ecosystem malware, it has not been studied as extensively as other types of malware such as ransomware and trojans. In this study, we employ machine learning techniques to analyze the behavior of different riskware families and identify similarities in their actions. Furthermore, our research identifies specific behaviors that can be used to distinguish these riskware families. To achieve these insights, we utilize various tools such as k-Means clustering, principal component analysis, extreme gradient boost classifiers, and Shapley additive explanation. Our findings can contribute significantly to the detection, identification, and forensic analysis of Android riskware.
引用
收藏
页数:19
相关论文
共 58 条
[1]   Peeking Inside the Black-Box: A Survey on Explainable Artificial Intelligence (XAI) [J].
Adadi, Amina ;
Berrada, Mohammed .
IEEE ACCESS, 2018, 6 :52138-52160
[2]   Android users privacy awareness survey [J].
Alani, Mohammed M. .
International Journal of Interactive Mobile Technologies, 2017, 11 (03) :130-144
[3]   PAIRED: An Explainable Lightweight Android Malware Detection System [J].
Alani, Mohammed M. ;
Awad, Ali Ismail .
IEEE ACCESS, 2022, 10 :73214-73228
[4]   AdStop: Efficient flow-based mobile adware detection using machine learning [J].
Alani, Mohammed M. ;
Awad, Ali Ismail .
COMPUTERS & SECURITY, 2022, 117
[5]  
[Anonymous], 2023, AndMal 2020|Datasets|Research|Canadian Institute for Cybersecurity|UNB
[6]   Reducing the window of opportunity for Android malware Gotta catch 'em all [J].
Apvrille, Axelle ;
Strazzere, Tim .
JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2012, 8 (1-2) :61-71
[7]  
Arshad S, 2016, INT J ADV COMPUT SC, V7, P463
[8]   Protecting Android Devices From Malware Attacks: A State-of-the-Art Report of Concepts, Modern Learning Models and Challenges [J].
Bayazit, Esra Calik ;
Sahingoz, Ozgur Koray ;
Dogan, Buket .
IEEE ACCESS, 2023, 11 :123314-123334
[9]   A system call-based android malware detection approach with homogeneous & heterogeneous ensemble machine learning [J].
Bhat, Parnika ;
Behal, Sunny ;
Dutta, Kamlesh .
COMPUTERS & SECURITY, 2023, 130
[10]  
Bouman C.A., 1997, Cluster: An Unsupervised Algorithm for Modeling Gaussian Mixtures