DroidDetectMW: A Hybrid Intelligent Model for Android Malware Detection

被引:22
作者
Taher, Fatma [1 ]
AlFandi, Omar [1 ]
Al-kfairy, Mousa [1 ]
Al Hamadi, Hussam [2 ]
Alrabaee, Saed [3 ]
机构
[1] Zayed Univ, Coll Technol Innovat, Dubai, U Arab Emirates
[2] Univ Dubai, Coll Engn & IT, Dubai, U Arab Emirates
[3] Coll Informat Technol, Al Ain 15551, U Arab Emirates
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 13期
关键词
malware; harris hawks optimization; feature selection; benign; multiclass classification; multi-verse optimization; moth-flame optimization; machine learning; FEATURE-SELECTION; CLASSIFICATION; ALGORITHM; PROTECTION; ROBUST;
D O I
10.3390/app13137720
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Malicious apps specifically aimed at the Android platform have increased in tandem with the proliferation of mobile devices. Malware is now so carefully written that it is difficult to detect. Due to the exponential growth in malware, manual methods of malware are increasingly ineffective. Although prior writers have proposed numerous high-quality approaches, static and dynamic assessments inherently necessitate intricate procedures. The obfuscation methods used by modern malware are incredibly complex and clever. As a result, it cannot be detected using only static malware analysis. As a result, this work presents a hybrid analysis approach, partially tailored for multiple-feature data, for identifying Android malware and classifying malware families to improve Android malware detection and classification. This paper offers a hybrid method that combines static and dynamic malware analysis to give a full view of the threat. Three distinct phases make up the framework proposed in this research. Normalization and feature extraction procedures are used in the first phase of pre-processing. Both static and dynamic features undergo feature selection in the second phase. Two feature selection strategies are proposed to choose the best subset of features to use for both static and dynamic features. The third phase involves applying a newly proposed detection model to classify android apps; this model uses a neural network optimized with an improved version of HHO. Application of binary and multi-class classification is used, with binary classification for benign and malware apps and multi-class classification for detecting malware categories and families. By utilizing the features gleaned from static and dynamic malware analysis, several machine-learning methods are used for malware classification. According to the results of the experiments, the hybrid approach improves the accuracy of detection and classification of Android malware compared to the scenario when considering static and dynamic information separately.
引用
收藏
页数:23
相关论文
共 61 条
[1]   Social Networking Security during COVID-19: A Systematic Literature Review [J].
Abid, Rabia ;
Rizwan, Muhammad ;
Vesely, Peter ;
Basharat, Asma ;
Tariq, Usman ;
Javed, Abdul Rehman .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
[2]  
Abuthawabeh MKA, 2019, INT ARAB CONF INF TE, P42, DOI [10.1109/acit47987.2019.8991114, 10.1109/ACIT47987.2019.8991114]
[3]  
Agrawal Prerna, 2021, Data Management, Analytics and Innovation. Proceedings of ICDMAI 2020. Advances in Intelligent Systems and Computing (AISC 1174), P311, DOI 10.1007/978-981-15-5616-6_22
[4]   A Robust Multi-Objective Feature Selection Model Based on Local Neighborhood Multi-Verse Optimization [J].
Aljarah, Ibrahim ;
Faris, Hossam ;
Heidari, Ali Asghar ;
Mafarja, Majdi M. ;
Al-Zoubi, Ala' M. ;
Castillo, Pedro A. ;
Merelo, Juan J. .
IEEE ACCESS, 2021, 9 :100009-100028
[5]   DL-Droid: Deep learning based android malware detection using real devices [J].
Alzaylaee, Mohammed K. ;
Yerima, Suleiman Y. ;
Sezer, Sakir .
COMPUTERS & SECURITY, 2020, 89
[6]  
[Anonymous], 2005, Nearest-neighbor Methods in Learning and Vision: Theory and Practice
[7]  
[Anonymous], 2021, Number of apps available in leading app stores as of 3rd quarter 2022
[8]  
[Anonymous], 2021, BBC
[9]  
[Anonymous], SMARTPH US WORLDW 20
[10]  
Blasing Thomas, 2010, 2010 5th International Conference on Malicious and Unwanted Software (MALWARE 2010), P55, DOI 10.1109/MALWARE.2010.5665792