The Malware Detection Approach in the Design of Mobile Applications

被引:5
作者
Aboshady, Doaa [1 ]
Ghannam, Naglaa [2 ]
Elsayed, Eman [2 ,3 ]
Diab, Lamiaa [2 ]
机构
[1] Tanta Univ, Fac Sci, Dept Math, Tanta 31511, Egypt
[2] Al Azhar Univ, Fac Sci, Dept Math, Girls Branch, Cairo 11884, Egypt
[3] Canadian Int Coll CIC, Sch Comp Sci, Cairo 11835, Egypt
来源
SYMMETRY-BASEL | 2022年 / 14卷 / 05期
关键词
malware detection; mobile applications; ontology; software quality; UML; revers engineering;
D O I
10.3390/sym14050839
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Background: security has become a major concern for smartphone users in line with the increasing use of mobile applications, which can be downloaded from unofficial sources. These applications make users vulnerable to penetration and viruses. Malicious software (malware) is unwanted software that is frequently used by cybercriminals to launch cyber-attacks. Therefore, the motive of the research was to detect malware early before infection by discovering it at the application-design level and not at the code level, where the virus will have already damaged the system. Methods: in this article, we proposed a malware detection method at the design level based on reverse engineering, the unified modeling language (UML) environment, and the web ontology language (OWL). The proposed method detected "Data_Send_Trojan" malware by designing a UML model that simulated the structure of the malware. Then, by generating the ontology of the model, and using RDF query language (SPARQL) to create certain queries, the malware was correctly detected. In addition, we proposed a new classification of malware that was suitable for design detection. Results: the proposed method detected Trojan malware that appeared 552 times in a sample of 600 infected android application packages (APK). The experimental results showed a good performance in detecting malware at the design level with precision and recall of 92% and 91%, respectively. As the dataset increased, the accuracy of detection increased significantly, which made this methodology promising.
引用
收藏
页数:16
相关论文
共 41 条
[1]   Malware classification and composition analysis: A survey of recent developments [J].
Abusitta, Adel ;
Li, Miles Q. ;
Fung, Benjamin C. M. .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 59
[2]   DroidMD: An efficient and scalable Android malware detection approach at source code level [J].
Akram J. ;
Mumtaz M. ;
Jabeen G. ;
Luo P. .
International Journal of Information and Computer Security, 2021, 15 (2-3) :299-321
[3]  
[Anonymous], 1998, Antipatterns: Refactoring Software, Architectures, and Projects in Crisis
[4]   Data augmentation based malware detection using convolutional neural networks [J].
Catak, Ferhat Ozgur ;
Ahmed, Javed ;
Sahinbas, Kevser ;
Khand, Zahid Hussain .
PEERJ COMPUTER SCIENCE, 2021,
[5]   A multiview learning method for malware threat hunting: windows, IoT and android as case studies [J].
Darabian, Hamid ;
Dehghantanha, Ali ;
Hashemi, Sattar ;
Taheri, Mohammad ;
Azmoodeh, Amin ;
Homayoun, Sajad ;
Choo, Kim-Kwang Raymond ;
Parizi, Reza M. .
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2020, 23 (02) :1241-1260
[6]   Visualization and deep-learning-based malware variant detection using OpCode-level features [J].
Darem, Abdulbasit ;
Abawajy, Jemal ;
Makkar, Aaisha ;
Alhashmi, Asma ;
Alanazi, Sultan .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 125 :314-323
[7]  
El-Dahshan K.A., 2019, P 2019 8 INT C SOFTW
[8]  
Elsayed E.K, 2019, INT J INTELL ENG SYS, V12, P25, DOI [10.22266/ijies2019.1231.03, DOI 10.22266/IJIES2019.1231.03]
[9]   Reverse engineering approach for improving the quality of mobile applications [J].
Elsayed, Eman K. ;
ElDahshan, Kamal A. ;
El-Sharawy, Enas E. ;
Ghannam, Naglaa E. .
PEERJ COMPUTER SCIENCE, 2019,
[10]   Improving malware detection using big data and ensemble learning [J].
Gupta, Deepak ;
Rani, Rinkle .
COMPUTERS & ELECTRICAL ENGINEERING, 2020, 86