AdDroid: Rule-Based Machine Learning Framework for Android Malware Analysis

被引:25
作者
Mehtab, Anam [1 ]
Shahid, Waleed Bin [1 ]
Yaqoob, Tahreem [1 ]
Amjad, Muhammad Faisal [1 ]
Abbas, Haider [1 ]
Afzal, Hammad [1 ]
Saqib, Malik Najmus [2 ]
机构
[1] Natl Univ Sciences, Technol, Islamabad, Pakistan
[2] Univ Jeddah, Jeddah, Saudi Arabia
关键词
Android malware analysis; Static analysis; Machine learning; Classification model; Mobile security;
D O I
10.1007/s11036-019-01248-0
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recent years have witnessed huge growth in Android malware development. Colossal reliance on Android applications for day to day working and their massive development dictates for an automated mechanism to distinguish malicious applications from benign ones. A significant amount of research has been devoted to analyzing and mitigating this growing problem; however, attackers are using more complicated techniques to evade detection. This paper proposes a framework, AdDroid; for analyzing and detecting malicious behaviour in Android applications based on various combinations of artefacts called Rules. The artefacts represent actions of an Android application such as connecting to the Internet, uploading a file to a remote server or installing another package on the device etc. AdDroid employs an ensemble-based machine learning technique where Adaboost is combined with traditional classifiers in order to train a model founded on static analysis of Android applications that is capable of recognizing malicious applications. Feature selection and extraction techniques are used to get the most distinguishing Rules. The proposed model is created using a dataset comprising 1420 Android applications with 910 malicious and 510 benign applications. Our proposed system achieved an accuracy of 99.11% with 98.61% True Positive (TP) and 99.33% True Negative (TN) rate. The high TP and TN rates reflect the efficacy on both major and minor class. Since the proposed solution has exceptionally low computational complexity, therefore, making it possible to analyze applications in real-time.
引用
收藏
页码:180 / 192
页数:13
相关论文
共 28 条
[21]   Enhancing User Privacy on Android Mobile Devices via Permissions Removal [J].
Quang Do ;
Martini, Ben ;
Choo, Kim-Kwang Raymond .
2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, :5070-5079
[22]  
Sahs J., 2012, 2012 European Intelligence and Security Informatics Conference (EISIC), P141, DOI 10.1109/EISIC.2012.34
[23]  
Sarma B.P, 2012, P 17 ACM S ACC CONTR, P13, DOI 10.1145/2295136.2295141
[24]  
Vidas T., 2014, P 4 ACM WORKSH SEC P, P39, DOI [10.1145/2666620.2666630, DOI 10.1145/2666620.2666630]
[25]   DroidMat: Android Malware Detection through Manifest and API Calls Tracing [J].
Wu, Dong-Jie ;
Mao, Ching-Hao ;
Wei, Te-En ;
Lee, Hahn-Ming ;
Wu, Kuo-Ping .
PROCEEDINGS OF THE 2012 SEVENTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2012), 2012, :62-69
[26]   Evaluation and Analysis of Spectrum-Based Fault Localization with Modified Similarity Coefficients for Software Debugging [J].
You, Yi-Sian ;
Huang, Chin-Yu ;
Peng, Kuan-Li ;
Hsu, Chao-Jung .
2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2013, :180-189
[27]   Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs [J].
Zhang, Mu ;
Duan, Yue ;
Yin, Heng ;
Zhao, Zhiruo .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :1105-1116
[28]  
Zhu M, 2014, ASIA PAC CONF ANTEN, P951, DOI 10.1109/APCAP.2014.6992660