Towards a Mobile Malware Detection Framework with the Support of Machine Learning

被引:3
作者
Geneiatakis, Dimitris [1 ]
Baldini, Gianmarco [1 ]
Fovino, Igor Nai [1 ]
Vakalis, Ioannis [1 ]
机构
[1] European Commiss, JRC, Cyber & Digital Citizens Secur Unit, Via Enrico Fermi 2749, I-21027 Ispra, Italy
来源
SECURITY IN COMPUTER AND INFORMATION SCIENCES, EURO-CYBERSEC 2018 | 2018年 / 821卷
关键词
D O I
10.1007/978-3-319-95189-8_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Several policies initiatives around the digital economy stress on one side the centrality of smartphones and mobile applications, and on the other call for attention on the threats to which this ecosystem is exposed to. Lately, a plethora of related works rely on machine learning algorithms to classify whether an application is malware or not, using data that can be extracted from the application itself with high accuracy. However, different parameters can influence machine learning effectiveness. Thus, in this paper we focus on validating the efficiency of such approaches in detecting malware for Android platform, and identifying the optimal characteristics that should be consolidated in any similar approach. To do so, we built a machine learning solution based on features that can be extracted by static analysis of any Android application, such as activities, services, broadcasts, receivers, intent categories, APIs, and permissions. The extracted features are analyzed using statistical analysis and machine learning algorithms. The performance of different sets of features are investigated and compared. The analysis shows that under an optimal configuration an accuracy up to 97% can be obtained.
引用
收藏
页码:119 / 129
页数:11
相关论文
共 18 条
[11]   Machine learning aided Android malware classification [J].
Milosevic, Nikola ;
Dehghantanha, Ali ;
Choo, Kitn-Kwang Raymond .
COMPUTERS & ELECTRICAL ENGINEERING, 2017, 61 :266-274
[12]  
Patanaik CK., 2012, P 1 INT C SEC INT TH, P185, DOI DOI 10.1145/2490428.2490454
[13]  
Pehlivan U., 2014, 2014 IEEE S COMPUTAT, P1
[14]  
Portokalidis G, 2010, 26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), P41
[15]   Merging Permission and API Features for Android Malware Detection [J].
Qiao, Mengyu ;
Sung, Andrew H. ;
Liu, Qingzhong .
PROCEEDINGS 2016 5TH IIAI INTERNATIONAL CONGRESS ON ADVANCED APPLIED INFORMATICS IIAI-AAI 2016, 2016, :566-571
[16]   Theoretical and empirical analysis of ReliefF and RReliefF [J].
Robnik-Sikonja, M ;
Kononenko, I .
MACHINE LEARNING, 2003, 53 (1-2) :23-69
[17]  
Wahanggara Victor, 2015, 2015 Fourth International Conference on Cyber-Security, Cyber-Warfare and Digital Forensics (CyberSec). Proceedings, P62, DOI 10.1109/CyberSec.2015.21
[18]   Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection [J].
Wang, Wei ;
Wang, Xing ;
Feng, Dawei ;
Liu, Jiqiang ;
Han, Zhen ;
Zhang, Xiangliang .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (11) :1869-1882