Android Botnet Detection using Convolutional Neural Networks

被引:0
作者
Hojjatinia, Sina [1 ]
Hamzenejadi, Sajad [1 ]
Mohseni, Hadis [1 ]
机构
[1] Shahid Bahonar Univ Kerman, Dept Comp Engn, Kerman, Iran
来源
2020 28TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE) | 2020年
关键词
Android botnet; Deep learning; Malware; CNN;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Today, Android devices are capable of providing various services. They support applications for different purposes, such as entertainment, business, health, education, and banking services. Because of the functionality and popularity of Android devices as well as the open-source policy of Android OS, they have become a suitable target for attackers. An Android botnet is one of the most dangerous malware because an attacker called botmaster can remotely control that to perform destructive attacks. Several researchers have used different well-known Machine Learning (ML) methods to recognize Android botnets from benign applications. However, these conventional methods are not capable of detecting new sophisticated Android botnets. In this paper, we propose a novel method based on Android permissions and Convolutional Neural Networks (CNNs) to detect Android botnet applications. Being the first developed method that applies CNNs for this aim, we also proposed a novel method to represent each application as an image that is constructed based on the co-occurrence of permissions given to that application. The proposed CNN is a binary classifier that is trained using these images. Evaluating the proposed method on 5450 Android applications consist of botnet and benign samples, the obtained results show the accuracy of 97.2% and recall of 96%, which is a promising result only using Android permissions.
引用
收藏
页码:674 / 679
页数:6
相关论文
共 27 条
[1]  
Abdullah Z., 2017, ADV SCI LETT, V23, P4717, DOI DOI 10.1166/asl.2017.8994
[2]  
Abdullah Z, 2014, 2014 IEEE 5TH CONTROL AND SYSTEM GRADUATE RESEARCH COLLOQUIUM (ICSGRC), P257, DOI 10.1109/ICSGRC.2014.6908733
[3]  
Alzahrani AJ, 2015, ANN CONF PRIV SECUR, P157, DOI 10.1109/PST.2015.7232968
[4]  
[Anonymous], 2019, SMARTPHONE MARKET SH
[5]  
[Anonymous], 2019, MCAFEE LABS THREATS
[6]  
Anwar S, 2016, INT CONF ELECTRON D, P563, DOI 10.1109/ICED.2016.7804708
[7]  
Deng L., 2018, DEEP LEARNING NATURA, DOI [10.1007/978-981-10-5209-5, DOI 10.1007/978-981-10-5209-5]
[8]  
Deng L, 2013, INT CONF ACOUST SPEE, P8599, DOI 10.1109/ICASSP.2013.6639344
[9]  
Feizollah A, 2013, MALAYS J COMPUT SCI, V26, P251
[10]  
Girei Daifur Abubakar, 2016, 2016 22nd International Conference on Automation and Computing (ICAC), P450, DOI 10.1109/IConAC.2016.7604961