SemiDroid: a behavioral malware detector based on unsupervised machine learning techniques using feature selection approaches

被引:24
作者
Mahindru, Arvind [1 ,2 ]
Sangal, A. L. [1 ]
机构
[1] Dr BR Ambedkar Natl Inst Technol, Dept Comp Sci & Engn, Jalandhar 144011, Punjab, India
[2] DAV Univ, Dept Comp Sci & Applicat, Jalandhar 144012, Punjab, India
关键词
Android apps; Permissions model; API calls; Unsupervised; Feature selection; Intrusion detection; Cyber security; Smartphone; FRAMEWORK; ALGORITHM;
D O I
10.1007/s13042-020-01238-9
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the exponential growth in Android apps, Android based devices are becoming victims of target attackers in the "silent battle" of cybernetics. To protect Android based devices from malware has become more complex and crucial for academicians and researchers. The main vulnerability lies in the underlying permission model of Android apps. Android apps demand permission or permission sets at the time of their installation. In this study, we consider permission and API calls as features that help in developing a model for malware detection. To select appropriate features or feature sets from thirty different categories of Android apps, we implemented ten distinct feature selection approaches. With the help of selected feature sets we developed distinct models by using five different unsupervised machine learning algorithms. We conduct an experiment on 5,00,000 distinct Android apps which belongs to thirty distinct categories. Empirical results reveals that the model build by considering rough set analysis as a feature selection approach, and farthest first as a machine learning algorithm achieved the highest detection rate of 98.8% to detect malware from real-world apps.
引用
收藏
页码:1369 / 1411
页数:43
相关论文
共 81 条
[1]  
Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
[2]   Iterative Classifier Fusion System for the Detection of Android Malware [J].
Abawajy, Jemal H. ;
Kelarev, Andrei .
IEEE TRANSACTIONS ON BIG DATA, 2019, 5 (03) :282-292
[3]   Intelligent mobile malware detection using permission requests and API calls [J].
Alazab, Moutaz ;
Alazab, Mamoun ;
Shalaginov, Andrii ;
Mesleh, Abdelwadood ;
Awajan, Albara .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 107 :509-521
[4]   A Novel Approach to Detect Android Malware [J].
Almin, Shaikh Bushra ;
Chatterjee, Madhumita .
INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA), 2015, 45 :407-417
[5]   DL-Droid: Deep learning based android malware detection using real devices [J].
Alzaylaee, Mohammed K. ;
Yerima, Suleiman Y. ;
Sezer, Sakir .
COMPUTERS & SECURITY, 2020, 89
[6]  
Amos B, 2013, INT WIREL COMMUN, P1666, DOI 10.1109/IWCMC.2013.6583806
[7]   Detection and Identification of Android Malware Based on Information Flow Monitoring [J].
Andriatsimandefitra, Radoniaina ;
Valerie Viet Triem Tong .
2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, :200-203
[8]  
[Anonymous], 2012, USENIX SEC S
[9]   PermPair: Android Malware Detection Using Permission Pairs [J].
Arora, Anshul ;
Peddoju, Sateesh K. ;
Conti, Mauro .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :1968-1982
[10]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,