Malware Detection on Android Smartphones using API Class and Machine Learning

被引:0
作者
Westyarian [1 ]
Rosmansyah, Yusep [1 ]
Dabarsyah, Budiman [1 ]
机构
[1] Inst Teknol Bandung, Sch Elect Engn & Informat, Dept Elect Engn, Jl Ganeca 10, Bandung 40132, Indonesia
来源
5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS 2015 | 2015年
关键词
Android; Malware detection; APIs class; Machine Learning;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a (new) method to detect malware in Android smartphones using API (application programming interface) classes. We use machine learning to classify whether an application is benign or malware. Furthermore, we compare classification precision rate from machine learning. This research uses 51 APIs package classes from 16 APIs classes and employs cross validation and percentage split test to classify benign and malware using Random Forest, J48, and Support Vector Machine algorithms. We use 412 total application samples (205 benign, 207 malware). We obtain that the classification precision average is 91.9%.
引用
收藏
页码:294 / 297
页数:4
相关论文
共 25 条
[1]  
Alam Mohammed S., 2013, 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, Physical and Social Computing (CPSCom), P663, DOI 10.1109/GreenCom-iThings-CPSCom.2013.122
[2]  
[Anonymous], ENCY DATABASE SYSTEM
[3]  
Bergeron J., 2001, Int. J. of Req. Eng
[4]  
Bishop M.A., 2002, The Art and Science of Computer Security
[5]  
Blasing Thomas, 2010, 2010 5th International Conference on Malicious and Unwanted Software (MALWARE 2010), P55, DOI 10.1109/MALWARE.2010.5665792
[6]  
Chan PPK, 2014, INT CONF MACH LEARN, P82, DOI 10.1109/ICMLC.2014.7009096
[7]  
Cifuentes C, 1997, INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS, P188
[8]   DECOMPILATION OF BINARY PROGRAMS [J].
CIFUENTES, C ;
GOUGH, KJ .
SOFTWARE-PRACTICE & EXPERIENCE, 1995, 25 (07) :811-829
[9]  
Fedler R, 2013, PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE: THE AMERICAS (MALWARE), P77, DOI 10.1109/MALWARE.2013.6703688
[10]  
Firdausi I., 2010, 2010 Proceedings of Second International Conference on Advances in Computing, Control and Telecommunication Technologies (ACT 2010), P201, DOI 10.1109/ACT.2010.33