Skip to main content
Top
Published in: Neural Computing and Applications 8/2021

20-07-2020 | Original Article

VisDroid: Android malware classification based on local and global image features, bag of visual words and machine learning techniques

Authors: Khaled Bakour, Halil Murat Ünver

Published in: Neural Computing and Applications | Issue 8/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, VisDroid, a novel generic image-based classification method has been suggested and developed for classifying the Android malware samples into its families. To this end, five grayscale image datasets each of which contains 4850 samples have been constructed based on different files from the contents of the Android malware samples sources. Two types of image-based features have been extracted and used to train six machine learning classifiers including Random Forest, K-nearest neighbour, Decision trees, Bagging, AdaBoost and Gradient Boost classifiers. The first type of the extracted features is local features including Scale-Invariant Feature Transform, Speeded Up Robust Features, Oriented FAST and Rotated BRIEF (ORB) and KAZE features. The second type of the extracted features is global features including Colour Histogram, Hu Moments and Haralick Texture. Furthermore, a hybridized ensemble voting classifier has been proposed to test the efficiency of using a number of machine learning classifiers trained using local and global features as voters to make a decision in an ensemble voting classifier. Moreover, two well-known deep learning model, i.e. Residual Neural Network and Inception-v3 have been tested using some of the constructed image datasets. Furthermore, when the results of the proposed model have been compared with the results of some state-of-art works it has been revealed that the proposed model outperforms the compared previous models in term of classification accuracy, computational time, generality and classification mode.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference McAfee (2018) AsiaHitGroup Gang Again sneaks billing-fraud apps onto google play. McAfee Labs threats report McAfee (2018) AsiaHitGroup Gang Again sneaks billing-fraud apps onto google play. McAfee Labs threats report
16.
go back to reference Hsien-De Huang T, Kao H-Y (2018) R2-d2: color-inspired convolutional neural network (cnn)-based android malware detections. In: 2018 IEEE international conference on Big Data (Big Data). IEEE Hsien-De Huang T, Kao H-Y (2018) R2-d2: color-inspired convolutional neural network (cnn)-based android malware detections. In: 2018 IEEE international conference on Big Data (Big Data). IEEE
17.
go back to reference Yang M, Wen Q (2017) Detecting android malware by applying classification techniques on images patterns. In: 2017 IEEE 2nd international conference on cloud computing and Big Data analysis (ICCCBDA). IEEE Yang M, Wen Q (2017) Detecting android malware by applying classification techniques on images patterns. In: 2017 IEEE 2nd international conference on cloud computing and Big Data analysis (ICCCBDA). IEEE
18.
go back to reference Karimi A, Moattar MH (2017) Android ransomware detection using reduced opcode sequence and image similarity. In 2017 7th international conference on computer and knowledge engineering (ICCKE). IEEE Karimi A, Moattar MH (2017) Android ransomware detection using reduced opcode sequence and image similarity. In 2017 7th international conference on computer and knowledge engineering (ICCKE). IEEE
19.
go back to reference Jain A,Gonzalez H, Stakhanova N (2015) Enriching reverse engineering through visual exploration of Android binaries. In: Proceedings of the 5th program protection and reverse engineering workshop. ACM Jain A,Gonzalez H, Stakhanova N (2015) Enriching reverse engineering through visual exploration of Android binaries. In: Proceedings of the 5th program protection and reverse engineering workshop. ACM
20.
go back to reference Yen Y-S, Sun H-M (2019) An Android mutation malware detection based on deep learning using visualization of importance from codes. Microelectron Reliab 93:109–114CrossRef Yen Y-S, Sun H-M (2019) An Android mutation malware detection based on deep learning using visualization of importance from codes. Microelectron Reliab 93:109–114CrossRef
21.
go back to reference Onwuzurike L et al (2019) MaMaDroid: detecting android malware by building markov chains of behavioral models (extended version). ACM Trans Privacy Secur (TOPS) 22(2):14 Onwuzurike L et al (2019) MaMaDroid: detecting android malware by building markov chains of behavioral models (extended version). ACM Trans Privacy Secur (TOPS) 22(2):14
22.
go back to reference Suarez-Tangil G et al (2014) Dendroid: a text mining approach to analyzing and classifying code structures in android malware families. Expert Syst Appl 41(4):1104–1117CrossRef Suarez-Tangil G et al (2014) Dendroid: a text mining approach to analyzing and classifying code structures in android malware families. Expert Syst Appl 41(4):1104–1117CrossRef
23.
go back to reference Bakour K, Ünver HM, Ghanem R (2019) The Android malware detection systems between hope and reality. SN Appl Sci 1(9):1120CrossRef Bakour K, Ünver HM, Ghanem R (2019) The Android malware detection systems between hope and reality. SN Appl Sci 1(9):1120CrossRef
24.
go back to reference Arp D et al (2014) Drebin: Effective and explainable detection of android malware in your pocket. In: NDSS Arp D et al (2014) Drebin: Effective and explainable detection of android malware in your pocket. In: NDSS
25.
go back to reference Zhou Y, Jiang X (2012) Dissecting android malware: characterization and evolution. In: 2012 IEEE symposium on security and privacy. IEEE Zhou Y, Jiang X (2012) Dissecting android malware: characterization and evolution. In: 2012 IEEE symposium on security and privacy. IEEE
26.
go back to reference Lisin DA et al (2015) Combining local and global image features for object class recognition. In: 2005 IEEE computer society conference on computer vision and pattern recognition (CVPR’05)-workshops. IEEE Lisin DA et al (2015) Combining local and global image features for object class recognition. In: 2005 IEEE computer society conference on computer vision and pattern recognition (CVPR’05)-workshops. IEEE
28.
go back to reference Huang Z, Leng J (2010) Analysis of Hu’s moment invariants on image scaling and rotation. In: 2010 2nd international conference on computer engineering and technology Huang Z, Leng J (2010) Analysis of Hu’s moment invariants on image scaling and rotation. In: 2010 2nd international conference on computer engineering and technology
29.
go back to reference Kumar RM, Sreekumar K (2014) A survey on image feature descriptors. Int J Comput Sci Inf Technol 5:7668–7673 Kumar RM, Sreekumar K (2014) A survey on image feature descriptors. Int J Comput Sci Inf Technol 5:7668–7673
30.
go back to reference Haralick RM, Shanmugam K (1973) Textural features for image classification. IEEE Trans Syst Man Cybern 6:610–621CrossRef Haralick RM, Shanmugam K (1973) Textural features for image classification. IEEE Trans Syst Man Cybern 6:610–621CrossRef
31.
go back to reference Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vision 60(2):91–110CrossRef Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vision 60(2):91–110CrossRef
32.
go back to reference Bay H, Tuytelaars T, Van Gool L (2006) Surf: speeded up robust features. In: European conference on computer vision. Springer Bay H, Tuytelaars T, Van Gool L (2006) Surf: speeded up robust features. In: European conference on computer vision. Springer
33.
go back to reference Alcantarilla PF, Bartoli A,Davison AJ (2012) KAZE features. In: European conference on computer vision. Springer Alcantarilla PF, Bartoli A,Davison AJ (2012) KAZE features. In: European conference on computer vision. Springer
34.
go back to reference Rublee E et al (2011) ORB: an efficient alternative to SIFT or SURF. In: ICCV. Citeseer Rublee E et al (2011) ORB: an efficient alternative to SIFT or SURF. In: ICCV. Citeseer
35.
go back to reference Rosten E, Drummond T (2006) Machine learning for high-speed corner detection. In: European conference on computer vision. Springer Rosten E, Drummond T (2006) Machine learning for high-speed corner detection. In: European conference on computer vision. Springer
36.
go back to reference Calonder M et al (2010) Brief: binary robust independent elementary features. In: European conference on computer vision. Springer Calonder M et al (2010) Brief: binary robust independent elementary features. In: European conference on computer vision. Springer
37.
go back to reference He K et al (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition He K et al (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition
38.
go back to reference Szegedy C et al (2016) Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE conference on computer vision and pattern recognition Szegedy C et al (2016) Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE conference on computer vision and pattern recognition
39.
go back to reference Szegedy C et al (2015) Going deeper with convolutions. In: Proceedings of the IEEE conference on computer vision and pattern recognition Szegedy C et al (2015) Going deeper with convolutions. In: Proceedings of the IEEE conference on computer vision and pattern recognition
41.
go back to reference Wu D-J et al (2012) Droidmat: Android malware detection through manifest and api calls tracing. In: 2012 seventh asia joint conference on information security. IEEE Wu D-J et al (2012) Droidmat: Android malware detection through manifest and api calls tracing. In: 2012 seventh asia joint conference on information security. IEEE
42.
go back to reference Deshotels L, Notani V, Lakhotia A (2014) Droidlegacy: automated familial classification of android malware. In: Proceedings of ACM SIGPLAN on program protection and reverse engineering workshop 2014. ACM Deshotels L, Notani V, Lakhotia A (2014) Droidlegacy: automated familial classification of android malware. In: Proceedings of ACM SIGPLAN on program protection and reverse engineering workshop 2014. ACM
43.
go back to reference Bakour K, Ünver HM, Ghanem R (2019) A deep camouflage: evaluating android’s anti-malware systems robustness against hybridization of obfuscation techniques with injection attacks. Arab J Sci Eng 44(11):9333–9347CrossRef Bakour K, Ünver HM, Ghanem R (2019) A deep camouflage: evaluating android’s anti-malware systems robustness against hybridization of obfuscation techniques with injection attacks. Arab J Sci Eng 44(11):9333–9347CrossRef
Metadata
Title
VisDroid: Android malware classification based on local and global image features, bag of visual words and machine learning techniques
Authors
Khaled Bakour
Halil Murat Ünver
Publication date
20-07-2020
Publisher
Springer London
Published in
Neural Computing and Applications / Issue 8/2021
Print ISSN: 0941-0643
Electronic ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-020-05195-w

Other articles of this Issue 8/2021

Neural Computing and Applications 8/2021 Go to the issue

Premium Partner