A Learning Model to Detect Android C&C Applications Using Hybrid Analysis

被引:1
|
作者
Qammar, Attia [1 ]
Karim, Ahmad [1 ]
Alharbi, Yasser [2 ]
Alsaffar, Mohammad [2 ]
Alharbi, Abdullah [2 ]
机构
[1] Bahauddin Zakariya Univ, Dept Informat Technol, Multan 60000, Pakistan
[2] Univ Hail, Coll Comp Sci & Engn, Hail 81451, Saudi Arabia
来源
COMPUTER SYSTEMS SCIENCE AND ENGINEERING | 2022年 / 43卷 / 03期
关键词
Android botnet; botnet detection; hybrid analysis; machine learning classifiers; mobile malware; BOTNETS;
D O I
10.32604/csse.2022.023652
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Smartphone devices particularly Android devices are in use by billions of people everywhere in the world. Similarly, this increasing rate attracts mobile botnet attacks which is a network of interconnected nodes operated through the command and control (C&C) method to expand malicious activities. At present, mobile botnet attacks launched the Distributed denial of services (DDoS) that causes to steal of sensitive data, remote access, and spam generation, etc. Consequently, various approaches are defined in the literature to detect mobile botnet attacks using static or dynamic analysis. In this paper, a novel hybrid model, the combination of static and dynamic methods that relies on machine learning to detect android botnet applications is proposed. Furthermore, results are evaluated using machine learning classifiers. The Random Forest (RF) classifier outperform as compared to other ML techniques i.e., Naive Bayes (NB), Support Vector Machine (SVM), and Simple Logistic (SL). Our proposed framework achieved 97.48% accuracy in the detection of botnet applications. Finally, some future research directions are highlighted regarding botnet attacks detection for the entire community.
引用
收藏
页码:915 / 930
页数:16
相关论文
共 18 条
  • [1] Robust Android Botnet C&C over GTalk Service
    Shin, Jongho
    Cho, Yookun
    Eun, Seongbae
    Yun, Young-Sun
    Jung, Jinman
    JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (05): : 865 - 875
  • [2] A New C&C Channel Detection Framework Using Heuristic Rule and Transfer Learning
    Jiang, Jianguo
    Yin, Qilei
    Shi, Zhixin
    Li, Meimei
    Lv, Bin
    2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2019,
  • [3] On the Security of Machine Learning in Malware C&C Detection: A Survey
    Gardiner, Joseph
    Nagaraja, Shishir
    ACM COMPUTING SURVEYS, 2016, 49 (03)
  • [4] Android Botnets: A Proof-of-Concept Using Hybrid Analysis Approach
    Karim, Ahmad
    Chang, Victor
    Firdaus, Ahmad
    JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2020, 32 (03) : 50 - 67
  • [5] FABLDroid: Malware detection based on hybrid analysis with factor analysis and broad learning methods for android applications
    Kilic, Kazim
    Atacak, Smail
    Dogru, brahim Alper
    ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2025, 62
  • [6] Machine Learning-based Detection of C&C Channels with a Focus on the Locked Shields Cyber Defense Exercise
    Kanzig, Nicolas
    Meier, Roland
    Gambazzi, Luca
    Lenders, Vincent
    Vanbever, Laurent
    2019 11TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON): SILENT BATTLE, 2019, : 401 - 419
  • [7] HAS-Analyzer: Detecting HTTP-based C&C based on the Analysis of HTTP Activity Sets
    Kim, Sung-Jin
    Lee, Sungryoul
    Bae, Byungchul
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (05): : 1801 - 1816
  • [8] Familial Classification of Android Malware using Hybrid Analysis
    Cavli, Omer Faruk Turan
    Sen, Sevil
    2020 INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCTURKEY 2020), 2020, : 62 - 67
  • [9] A hybrid intelligent approach to detect Android Botnet using Smart Self-Adaptive Learning-based PSO-SVM
    Moodi, Mahdi
    Ghazvini, Mahdieh
    Moodi, Hossein
    KNOWLEDGE-BASED SYSTEMS, 2021, 222
  • [10] Detecting sensitive data leakage via inter-applications on Android using a hybrid analysis technique
    Nguyen Tan Cam
    Van-Hau Pham
    Tuan Nguyen
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1055 - 1064