Skip to main content

2017 | OriginalPaper | Buchkapitel

DMDAM: Data Mining Based Detection of Android Malware

verfasst von : Abhishek Bhattacharya, Radha Tamal Goswami

Erschienen in: Proceedings of the First International Conference on Intelligent Computing and Communication

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Mobile malwares have been rising in scale as Android operating system enabled smart phones are getting popularity around the world. To fight against this outburst of Android malwares, different static and dynamic malware detection methods have been proposed. One of the popular methods of static detection technique is permission based detection of malwares through AndroidManifest.xml file using machine learning classifiers. However, the comparison of different machine learning classifiers on different data sets has not been fully cultivated by existing literatures. In this work we propose a framework which extracts the permission features of manifest files, generates feature vectors and uses different machine learning classifiers of a Data Mining Tool, Weka to classify android applications. We evaluate our method on a set of total 170 applications (100 benign, 70 malwares) and results show that highest TPR rate is 96.70 % while accuracy is up to 77.13 % and highest F1 score is 0.8583.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Borja Sanz, Igor Santos, Xabier Ugarte-Pedrero, Carlos Laorden, Javier Nieves, and Pablo Garcia Bringas, “Instance-based Anomaly Method for Android Malware Detection”, SECRYPT, SciTePress, pp. 387–394, 2013. Borja Sanz, Igor Santos, Xabier Ugarte-Pedrero, Carlos Laorden, Javier Nieves, and Pablo Garcia Bringas, “Instance-based Anomaly Method for Android Malware Detection”, SECRYPT, SciTePress, pp. 387–394, 2013.
2.
Zurück zum Zitat I. Burquera, U. Zurutuza, and S. Nadjm-Tehrani, “Crowdroid: behavior-based malware detection system for Android,” in Proc. the 1st ACM workshop on Security and privacy in smartphones and mobile devices, 2011, pp. 15–26, 2011. I. Burquera, U. Zurutuza, and S. Nadjm-Tehrani, “Crowdroid: behavior-based malware detection system for Android,” in Proc. the 1st ACM workshop on Security and privacy in smartphones and mobile devices, 2011, pp. 15–26, 2011.
3.
Zurück zum Zitat K. Allix, T. F. D. A. Bissyande, J. Klein, and Y. Le Traon,, “Machine Learning-Based Malware Detection for Android Applications: History Matters!,” Technical Report, University of Luxembourg, 2014. K. Allix, T. F. D. A. Bissyande, J. Klein, and Y. Le Traon,, “Machine Learning-Based Malware Detection for Android Applications: History Matters!,” Technical Report, University of Luxembourg, 2014.
4.
Zurück zum Zitat Wei Xu, Fangfang Zhang, Sencun Zhu, “Permlyzer: Analyzing permission usage in Android applications”, In Proc. of IEEE International Symposium on Software reliability Engineering (ISSRE), pp. 400–410, 2013. Wei Xu, Fangfang Zhang, Sencun Zhu, “Permlyzer: Analyzing permission usage in Android applications”, In Proc. of IEEE International Symposium on Software reliability Engineering (ISSRE), pp. 400–410, 2013.
5.
Zurück zum Zitat Ryo Sato, Daiki Chiba and Shigeki Goto, “Detecting Android Malware by Analyzing Manifest Files”, Proceedings of the APAN – Network Research Workshop, pp. 1–9, 2013. Ryo Sato, Daiki Chiba and Shigeki Goto, “Detecting Android Malware by Analyzing Manifest Files”, Proceedings of the APAN – Network Research Workshop, pp. 1–9, 2013.
6.
Zurück zum Zitat S. Y. Yerima, S Sezer, G. McWilliams,” Analysis of Bayesian classification-based approaches for Android malware detection”, IET, vol. 8, issue 1, pp. 25–36, 2014. S. Y. Yerima, S Sezer, G. McWilliams,” Analysis of Bayesian classification-based approaches for Android malware detection”, IET, vol. 8, issue 1, pp. 25–36, 2014.
7.
Zurück zum Zitat Paolo Rovelli, Ýmir Vigfússon, “PMDS: Permission-Based Malware Detection System”, Information Systems Security Lecture Notes in Computer Science vol. 8880, pp. 338–357, 2014. Paolo Rovelli, Ýmir Vigfússon, “PMDS: Permission-Based Malware Detection System”, Information Systems Security Lecture Notes in Computer Science vol. 8880, pp. 338–357, 2014.
8.
Zurück zum Zitat Wei Wang, Xing Wang, Dawei Feng, Jiqiang Liu, Zhen Han, Xiangliang Zhang, “Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection”, IEEE Transactions on Information Forensics and Security, vol. 9, issue 11, pp. 1869–1882, 2014. Wei Wang, Xing Wang, Dawei Feng, Jiqiang Liu, Zhen Han, Xiangliang Zhang, “Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection”, IEEE Transactions on Information Forensics and Security, vol. 9, issue 11, pp. 1869–1882, 2014.
10.
Zurück zum Zitat Hyunjae, Kang, Jae-wook Jang, Aziz Mohaisen, Huy Kang Kim, “Detecting and Classifying Android Malware Using Static Analysis along with Creator Information”, International Journal of Distributed Sensor Networks vol. 2015, pp. 1–9, 2015. Hyunjae, Kang, Jae-wook Jang, Aziz Mohaisen, Huy Kang Kim, “Detecting and Classifying Android Malware Using Static Analysis along with Creator Information”, International Journal of Distributed Sensor Networks vol. 2015, pp. 1–9, 2015.
11.
Zurück zum Zitat A. M. Aswini, P. Vinod, “Android Malware Analysis Using Ensemble Features”, Security, Privacy, and Applied Cryptography Engineering Lecture Notes in Computer Science vol. 8804, pp. 303–318, 2014. A. M. Aswini, P. Vinod, “Android Malware Analysis Using Ensemble Features”, Security, Privacy, and Applied Cryptography Engineering Lecture Notes in Computer Science vol. 8804, pp. 303–318, 2014.
12.
Zurück zum Zitat Borja Sanz, Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Pablo Garcia Bringas, Gonzalo Álvarez, “PUMA: Permission Usage to Detect Malware in Android”, International Joint Conference CISIS’12-ICEUTE´12-SOCO´12 Special Sessions, Advances in Intelligent Systems and Computing, vol. 189, pp. 289–298, 2013. Borja Sanz, Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Pablo Garcia Bringas, Gonzalo Álvarez, “PUMA: Permission Usage to Detect Malware in Android”, International Joint Conference CISIS’12-ICEUTE´12-SOCO´12 Special Sessions, Advances in Intelligent Systems and Computing, vol. 189, pp. 289–298, 2013.
13.
Zurück zum Zitat Zarni Aung, Win Zaw, “Permission-Based Android Malware Detection”, International Journal Of Scientific & Technology Research, vol. 2, issue 3, pp. 228–234, 2013. Zarni Aung, Win Zaw, “Permission-Based Android Malware Detection”, International Journal Of Scientific & Technology Research, vol. 2, issue 3, pp. 228–234, 2013.
Metadaten
Titel
DMDAM: Data Mining Based Detection of Android Malware
verfasst von
Abhishek Bhattacharya
Radha Tamal Goswami
Copyright-Jahr
2017
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-2035-3_20

Premium Partner