Innovative Approach to Android Malware Detection: Prioritizing Critical Features Using Rough Set Theory

被引:4
作者
Gupta, Rahul [1 ]
Sharma, Kapil [1 ]
Garg, Ramesh Kumar [2 ]
机构
[1] Delhi Technol Univ, Dept Informat Technol, New Delhi 110042, India
[2] Deenbandhu Chhotu Ram Univ Sci & Technol, Dept Mech Engn, Murthal 131039, India
关键词
android; malware; ranking; reduct; rough sets; prediction; FRAMEWORK; MANIFEST;
D O I
10.3390/electronics13030482
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The widespread integration of smartphones into modern society has profoundly impacted various aspects of our lives, revolutionizing communication, work, entertainment, and access to information. Among the diverse range of smartphones available, those operating on the Android platform dominate the market as the most widely adopted type. With a commanding 70% share in the global mobile operating systems market, the Android OS has played a pivotal role in the surge of malware attacks targeting the Android ecosystem in recent years. This underscores the pressing need for innovative methods to detect Android malware. In this context, our study pioneers the application of rough set theory in Android malware detection. Adopting rough set theory offers distinct advantages, including its ability to effectively select attributes and handle qualitative and quantitative features. We utilize permissions, API calls, system commands, and opcodes in conjunction with rough set theory concepts to facilitate the identification of Android malware. By leveraging a Discernibility Matrix, we assign ranks to these diverse features and subsequently calculate their reducts-streamlined subsets of attributes that enhance overall detection effectiveness while minimizing complexity. Our approach encompasses deploying various Machine Learning (ML) algorithms, such as Support Vector Machines (SVM), K-Nearest Neighbor, Random Forest, and Logistic Regression, for malware detection. The results of our experiments demonstrate an impressive overall accuracy of 97%, surpassing numerous state-of-the-art detection techniques proposed in existing literature.
引用
收藏
页数:26
相关论文
共 45 条
[1]   Intelligent mobile malware detection using permission requests and API calls [J].
Alazab, Moutaz ;
Alazab, Mamoun ;
Shalaginov, Andrii ;
Mesleh, Abdelwadood ;
Awajan, Albara .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 107 :509-521
[2]  
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1145/2901739.2903508, 10.1109/MSR.2016.056]
[3]   PermPair: Android Malware Detection Using Permission Pairs [J].
Arora, Anshul ;
Peddoju, Sateesh K. ;
Conti, Mauro .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :1968-1982
[4]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[5]   FAMD: A Fast Multifeature Android Malware Detection Framework, Design, and Implementation [J].
Bai, Hongpeng ;
Xie, Nannan ;
Di, Xiaoqiang ;
Ye, Qing .
IEEE ACCESS, 2020, 8 :194729-194740
[6]   Personal information leakage detection method using the inference-based access control model on the Android platform [J].
Choi, Junho ;
Sung, Woon ;
Choi, Chang ;
Kim, Pankoo .
PERVASIVE AND MOBILE COMPUTING, 2015, 24 :138-149
[7]   Profiling user-trigger dependence for Android malware detection [J].
Elish, Karim O. ;
Shu, Xiaokui ;
Yao, Danfeng ;
Ryder, Barbara G. ;
Jiang, Xuxian .
COMPUTERS & SECURITY, 2015, 49 :255-273
[8]  
Enck W, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P235
[9]   Android Malware Familial Classification Based on DEX File Section Features [J].
Fang, Yong ;
Gao, Yangchen ;
Jing, Fan ;
Zhang, Lei .
IEEE ACCESS, 2020, 8 :10614-10627
[10]   Manilyzer: Automated Android Malware Detection through Manifest Analysis [J].
Feldman, Stephen ;
Stadther, Dillon ;
Wang, Bing .
2014 IEEE 11TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS), 2014, :767-772