Abstract
Malicious developers are developing unsafe mobile apps which puts users at risk of exposing their personal data in unsafe hands. They are using techniques that change over time and their intention is to bypass the detector systems which are mostly rule-based. This paper avoids the limitations of rule-based systems by building a novel malware detector that can detect malicious apps by making use of machine learning techniques primarily focusing on deep neural networks i.e. deep multi-layer perceptron. These techniques have various properties that can adapt and identify various types of malicious applications. Simulation results on various datasets demonstrate clear superiority of this detector over other approaches, as this approach achieves 99% accuracy. Also, the detector is efficient enough to detect within 100 ms or less due to the intelligent use of autoencoder which reduces the dimensions in the feature.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Peng, H., et al.: Using probabilistic generative models for ranking risks of android apps. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, ser. CCS 2012, New York, NY, USA, pp. 241–252. ACM (2012)
Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, ser. CCS 2011, New York, NY, USA, pp. 627–638. ACM (2011)
Genkin, A., Lewis, D.D., Madigan, D.: Large-scale Bayesian logistic regression for text categorization. Technometrics 49, 291–304 (2007)
Wang, Q., Si, L., Zhang, D.: A discriminative data-dependent mixture-model approach for multiple instance learning in image classification. In: Fitzgibbon, A., Lazebnik, S., Perona, P., Sato, Y., Schmid, C. (eds.) ECCV 2012. LNCS, vol. 7575, pp. 660–673. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-33765-9_47
Grace, M., Zhou, Y., Zhang, Q., Zou, S., Jiang, X.: Riskranker: scalable and accurate zero-day android malware detection. In: Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, ser. MobiSys 2012, New York, NY, USA, pp. 281–294. ACM (2012)
Schmidt, A.-D., Clausen, J.H., Camtepe, S.A., Albayrak, S.: Detecting Symbian OS malware through static function call analysis. In: Proceedings of the 4th IEEE International Conference on Malicious and Unwanted Software (Malware 2009), pp. 15–22. IEEE (2009)
He, H., Garcia, E.A.: Learning from imbalanced data. IEEE Trans. Knowl. Data Eng. 21(9), 1263–1284 (2009)
Kolter, J.Z., Maloof, M.A.: Learning to detect and classify malicious executables in the wild. J. Mach. Learn. Res. 7, 2721–2744 (2006)
Jang, J., Brumley, D., Venkataraman, S.: Bitshred: feature hashing malware for scalable triage and semantic analysis. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, ser. 1 CCS 2011, New York, NY, USA, pp. 309–320. ACM (2011)
Desnos, A.: Android: Static analysis using similarity distance. In: 2012 45th Hawaii International Conference on System Sciences (HICSS), pp. 5394–5403 (2012)
Schmidt, A.-D., et al.: Static analysis of executables for collaborative malware detection on android. In: ICC, pp. 1–5. IEEE (2009)
Jusoh, R., Firdaus, A., Anwar, S., Osman, M.Z., Darmawan, M.F., Ab Razak, M.F.: Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation). Peer J. Comput. Sci. 7, e522 (2021). https://doi.org/10.7717/peerj-cs.522
Aafer, Y., Du, W., Yin, H.: DroidAPIMiner: mining API-level features for robust malware detection in Android. In: Proceedings of the 9th International Conference on Security and Privacy in Communication Networks, September 2013
Christodorescu, M., Jha, S., Kruegel, C.: Mining specifications of malicious behavior. In: Proceedings of the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering, ser. ESEC-FSE 2007, New York, NY, USA, pp. 5–14. ACM (2007)
Shanmukh, V.: Image Classification Using Machine Learning-Support Vector Machine (SVM), 3rd March 2021. https://medium.com/analytics-vidhya/image-classification-using-machine-learning-support-vector-machine-svm-dc7a0ec92e01. Accessed 25 Feb 2022
Bailey, M., Oberheide, J., Andersen, J., Mao, Z.M., Jahanian, F., Nazario, J.: Automated classification and analysis of internet malware. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 178–197. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74320-0_10
Shabtai, A., Elovici, Y.: Applying behavioral detection on android-based devices, October 2012
Portokalidis, G., Homburg, P., Anagnostakis, K., Bos, H.: Paranoid android: versatile protection for smartphones. In: Proceedings of the 26th Annual Computer Security Applications Conference, ser. ACSAC 2010, New York, NY, USA, pp. 347–356. ACM (2010). https://doi.org/10.1145/1920261.1920313
Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, ser. SPSM 2011. New York, NY, USA, pp. 15–26. ACM (2011)
Au, K.W.Y., Zhou, Y.F., Huang, Z., Lie, D.: Pscout: analyzing the android permission specification. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, ser. CCS 2012, New York, NY, USA, pp. 217–228. ACM (2012)
Felt, A.P., Greenwood, K., Wagner, D.: The effectiveness of application permissions. In: Proceedings of the 2nd USENIX Conference on Web Application Development, ser. WebApps 2011, Berkeley, CA, USA, p. 7. USENIX Association (2011)
Davis, J., Goadrich, M.: The relationship between precision-recall and ROC curves. In: Proceedings of the 23rd International Conference on Machine Learning, ser. ICML 2006, New York, NY, USA, pp. 233–240. ACM (2006)
Yuan, Z., Lu, Y., Wang, Z., Xue, Y.: Droid-Sec: deep learning in an- droid malware detection. In: ACM SIGCOMM Computer Communication Review, vol. 44(4), pp. 371–372. ACM (2014)
Yuan, Z., Lu, Y., Xue, Y.: Droiddetector: android malware characterization and detection using deep learning. Tsinghua S. Technol. 21(1), 114–123 (2016)
Worldpanel, K.: Smartphone OS market share (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 IFIP International Federation for Information Processing
About this paper
Cite this paper
Kazemian, H. (2022). Machine Learning Approach to Detect Malicious Mobile Apps. In: Maglogiannis, I., Iliadis, L., Macintyre, J., Cortez, P. (eds) Artificial Intelligence Applications and Innovations. AIAI 2022. IFIP Advances in Information and Communication Technology, vol 647. Springer, Cham. https://doi.org/10.1007/978-3-031-08337-2_11
Download citation
DOI: https://doi.org/10.1007/978-3-031-08337-2_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-08336-5
Online ISBN: 978-3-031-08337-2
eBook Packages: Computer ScienceComputer Science (R0)