APKOWL: An Automatic Approach to Enhance the Malware Detection

被引:1
|
作者
Aboshady, Doaa [1 ]
Ghannam, Naglaa E. [2 ]
Elsayed, Eman K. [2 ,3 ]
Diab, L. S. [2 ,4 ]
机构
[1] Tanta Univ, Fac Sci, Math Dept, Tanta, Egypt
[2] Al Azhar Univ, Fac Sci, Math Dept, Girls branch, Cairo, Egypt
[3] Canadian Int Coll CIC, Sch Comp Sci, Cairo Governorate, Egypt
[4] Imam Mohammad Ibn Saud Islamic Univ, Coll Sci 323, Dept Math & Stat, King Abdullah City Female Students, Riyadh, Saudi Arabia
关键词
Malware detection; OWL ontology; Mobile application; Reverse engineering; Software Quality; DATA FUSION; CLASSIFICATION; CHALLENGES;
D O I
10.1007/s11036-023-02159-x
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Malicious software (malware) can steal passwords, leak details, and generally cause havoc with users' accounts. Most of the current malware detection techniques are designed to detect malware at the code level of the software, where it is actually infected and causes damage. Additionally, current malware detection techniques at the design level are done manually or semi-automatically. This research aims to enhance these methods to detect malware at the design level automatically with a big dataset. The proposed method presents an automatic system for detecting SMS (Short Message Service) malware at the design which is called APKOWL. It is based on reverse engineering of the mobile application and then automatically builds OWL (web ontology Language) ontology. The proposed system is implemented in python and Protege, and its performance has been tested and evaluated on samples of android mobile applications including 3,904 malware and 3,200 benign samples. The experimental results successfully verify the effectiveness of the proposed method because it has good performance in detecting SMS malware at the software design level. The proposed method obtained an accuracy of 97%, precision of 97.5%, and recall of 99%, outperforming the compared model in all performance metrics.
引用
收藏
页码:1901 / 1912
页数:12
相关论文
共 50 条
  • [31] A Novel Malware Analysis Framework for Malware Detection and Classification using Machine Learning Approach
    Sethi, Kamalakanta
    Chaudhary, Shankar Kumar
    Tripathy, Bata Krishan
    Bera, Padmalochan
    ICDCN'18: PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, 2018,
  • [32] Enhancing Smart IoT Malware Detection: A GhostNet-based Hybrid Approach
    Almazroi, Abdulwahab Ali
    Ayub, Nasir
    SYSTEMS, 2023, 11 (11):
  • [33] Automatic Malware Detection Using Deep Learning Based on Static Analysis
    Liu, Liu
    Wang, Baosheng
    DATA SCIENCE, PT 1, 2017, 727 : 500 - 507
  • [34] Graph embedding as a new approach for unknown malware detection
    Hashemi H.
    Azmoodeh A.
    Hamzeh A.
    Hashemi S.
    Journal of Computer Virology and Hacking Techniques, 2017, 13 (3) : 153 - 166
  • [35] HeuCrip: a malware detection approach for internet of battlefield things
    Imtiaz Ali shah
    Abid Mehmood
    Abdul Nasir Khan
    Mourad Elhadef
    Atta ur Rehman Khan
    Cluster Computing, 2023, 26 : 977 - 992
  • [36] Detection and Mitigation of Android Malware Through Hybrid Approach
    Patel, Kanubhai
    Buddadev, Bharat
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 455 - 463
  • [37] A process calculus approach to detection and mitigation of PLC malware
    Lanotte, Ruggero
    Merro, Massimo
    Munteanu, Andrei
    THEORETICAL COMPUTER SCIENCE, 2021, 890 : 125 - 146
  • [38] A Constraint-Driven Approach for Dynamic Malware Detection
    Bernardi, Mario Luca
    Cimitile, Marta
    Distante, Damiano
    Mercaldo, Francesco
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [39] A Malware Detection Approach Using Autoencoder in Deep Learning
    Xing, Xiaofei
    Jin, Xiang
    Elahi, Haroon
    Jiang, Hai
    Wang, Guojun
    IEEE ACCESS, 2022, 10 : 25696 - 25706
  • [40] A Risk Classification Based Approach for Android Malware Detection
    Ye, Yilin
    Wu, Lifa
    Hong, Zheng
    Huang, Kangyu
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (02): : 959 - 981