A Context-Aware Android Malware Detection Approach Using Machine Learning

被引:10
作者
AlJarrah, Mohammed N. [1 ]
Yaseen, Qussai M. [1 ,2 ]
Mustafa, Ahmad M. [1 ]
机构
[1] Jordan Univ Sci & Technol, CIS Dept, Irbid 22110, Jordan
[2] Ajman Univ, Artificial Intelligence Res Ctr AIRC, Ajman, U Arab Emirates
关键词
Android; API Calls; contextual information; machine learning; malware; permissions;
D O I
10.3390/info13120563
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Android platform has become the most popular smartphone operating system, which makes it a target for malicious mobile apps. This paper proposes a machine learning-based approach for Android malware detection based on application features. Unlike many prior research that focused exclusively on API Calls and permissions features to improve detection efficiency and accuracy, this paper incorporates applications' contextual features with API Calls and permissions features. Moreover, the proposed approach extracted a new dataset of static API Calls and permission features using a large dataset of malicious and benign Android APK samples. Furthermore, the proposed approach used the Information Gain algorithm to reduce the API and permission feature space from 527 to the most relevant 50 features only. Several combinations of API Calls, permissions, and contextual features were used. These combinations were fed into different machine-learning algorithms to show the significance of using the selected contextual features in detecting Android malware. The experiments show that the proposed model achieved a very high accuracy of about 99.4% when using contextual features in comparison to 97.2% without using contextual features. Moreover, the paper shows that the proposed approach outperformed the state-of-the-art models considered in this work.
引用
收藏
页数:25
相关论文
共 63 条
[1]  
Abdullah TAA, 2020, INT J ADV COMPUT SC, V11, P215
[2]   Effects of Distance Measure Choice on K-Nearest Neighbor Classifier Performance: A Review [J].
Abu Alfeilat, Haneen Arafat ;
Hassanat, Ahmad B. A. ;
Lasassmeh, Omar ;
Tarawneh, Ahmad S. ;
Alhasanat, Mahmoud Bashir ;
Salman, Hamzeh S. Eyal ;
Prasath, V. B. Surya .
BIG DATA, 2019, 7 (04) :221-248
[3]  
Agrawal Prerna, 2021, Data Management, Analytics and Innovation. Proceedings of ICDMAI 2020. Advances in Intelligent Systems and Computing (AISC 1174), P311, DOI 10.1007/978-981-15-5616-6_22
[4]  
Alzaylaee MK, 2016, 2016 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY)
[5]  
Amamra A, 2012, PROCEEDINGS OF THE 2012 7TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE, P79, DOI 10.1109/MALWARE.2012.6461012
[6]  
[Anonymous], ICC-Bench
[7]  
[Anonymous], MOBILE SECURITY REV
[8]  
[Anonymous], Welcome to Androguard's documentation
[9]  
[Anonymous], 2021, MOBILE MALWARE EVOLU
[10]  
[Anonymous], KOODOUS COLLECTIVE I