Malware Detection in Android Mobile Platform using Machine Learning Algorithms

被引:0
作者
Al Ali, Mariam [1 ]
Svetinovic, Davor [1 ]
Aung, Zeyar [1 ]
Lukman, Suryani [1 ]
机构
[1] Khalifa Univ Sci & Technol, Abu Dhabi, U Arab Emirates
来源
2017 INTERNATIONAL CONFERENCE ON INFOCOM TECHNOLOGIES AND UNMANNED SYSTEMS (TRENDS AND FUTURE DIRECTIONS) (ICTUS) | 2017年
关键词
malware detection; Android; apps; classification; machine learning;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware has always been a problem in regards to any technological advances in the software world. Thus, it is to be expected that smart phones and other mobile devices are facing the same issues. In this paper, a practical and effective anomaly based malware detection framework is proposed with an emphasis on Android mobile computing platform. A dataset consisting of both benign and malicious applications (apps) were installed on an Android device to analyze the behavioral patterns. We first generate the system metrics (feature vector) from each app by executing it in a controlled environment. Then, a variety of machine learning algorithms: Decision Tree, K Nearest Neighbor, Logistic Regression, Multilayer Perceptron Neural Network, Naive Bayes, Random Forest, and Support Vector Machine are used to classify the app as benign or malware. Each algorithm is assessed using various performance criteria to identify which ones are more suitable to detect malicious software. The results suggest that Random Forest and Support Vector Machine provide the best outcomes thus making them the most effective techniques for malware detection.
引用
收藏
页码:763 / 768
页数:6
相关论文
共 24 条
[1]  
Al Ali M., 2016, THESIS
[2]  
[Anonymous], 2009, TECH REP
[3]  
[Anonymous], 2015, J. Inf. Privacy Secur, DOI [10.1080/15536548.2015.1073510, DOI 10.1080/15536548.2015.1073510]
[4]  
[Anonymous], 2002, LOND COMM S
[5]  
[Anonymous], 2011, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
[6]  
Bhargava N., 2013, INT J ADV RES COMPUT, V3, P1114
[7]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[8]   An introduction to ROC analysis [J].
Fawcett, Tom .
PATTERN RECOGNITION LETTERS, 2006, 27 (08) :861-874
[9]  
Feizollah A, 2013, MALAYS J COMPUT SCI, V26, P251
[10]  
Hall M., 2009, SIGKDD EXPLORATIONS, V11, P10, DOI [DOI 10.1145/1656274.1656278, 10.1145/1656274.1656278]