Skip to main content

Machine Learning Approach to Detect Malicious Mobile Apps

  • Conference paper
  • First Online:
Artificial Intelligence Applications and Innovations (AIAI 2022)

Part of the book series: IFIP Advances in Information and Communication Technology ((IFIPAICT,volume 647))

  • 931 Accesses

Abstract

Malicious developers are developing unsafe mobile apps which puts users at risk of exposing their personal data in unsafe hands. They are using techniques that change over time and their intention is to bypass the detector systems which are mostly rule-based. This paper avoids the limitations of rule-based systems by building a novel malware detector that can detect malicious apps by making use of machine learning techniques primarily focusing on deep neural networks i.e. deep multi-layer perceptron. These techniques have various properties that can adapt and identify various types of malicious applications. Simulation results on various datasets demonstrate clear superiority of this detector over other approaches, as this approach achieves 99% accuracy. Also, the detector is efficient enough to detect within 100 ms or less due to the intelligent use of autoencoder which reduces the dimensions in the feature.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Peng, H., et al.: Using probabilistic generative models for ranking risks of android apps. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, ser. CCS 2012, New York, NY, USA, pp. 241–252. ACM (2012)

    Google Scholar 

  2. Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, ser. CCS 2011, New York, NY, USA, pp. 627–638. ACM (2011)

    Google Scholar 

  3. Genkin, A., Lewis, D.D., Madigan, D.: Large-scale Bayesian logistic regression for text categorization. Technometrics 49, 291–304 (2007)

    Article  MathSciNet  Google Scholar 

  4. Wang, Q., Si, L., Zhang, D.: A discriminative data-dependent mixture-model approach for multiple instance learning in image classification. In: Fitzgibbon, A., Lazebnik, S., Perona, P., Sato, Y., Schmid, C. (eds.) ECCV 2012. LNCS, vol. 7575, pp. 660–673. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-33765-9_47

    Chapter  Google Scholar 

  5. Grace, M., Zhou, Y., Zhang, Q., Zou, S., Jiang, X.: Riskranker: scalable and accurate zero-day android malware detection. In: Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, ser. MobiSys 2012, New York, NY, USA, pp. 281–294. ACM (2012)

    Google Scholar 

  6. Schmidt, A.-D., Clausen, J.H., Camtepe, S.A., Albayrak, S.: Detecting Symbian OS malware through static function call analysis. In: Proceedings of the 4th IEEE International Conference on Malicious and Unwanted Software (Malware 2009), pp. 15–22. IEEE (2009)

    Google Scholar 

  7. He, H., Garcia, E.A.: Learning from imbalanced data. IEEE Trans. Knowl. Data Eng. 21(9), 1263–1284 (2009)

    Google Scholar 

  8. Kolter, J.Z., Maloof, M.A.: Learning to detect and classify malicious executables in the wild. J. Mach. Learn. Res. 7, 2721–2744 (2006)

    MathSciNet  MATH  Google Scholar 

  9. Jang, J., Brumley, D., Venkataraman, S.: Bitshred: feature hashing malware for scalable triage and semantic analysis. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, ser. 1 CCS 2011, New York, NY, USA, pp. 309–320. ACM (2011)

    Google Scholar 

  10. Desnos, A.: Android: Static analysis using similarity distance. In: 2012 45th Hawaii International Conference on System Sciences (HICSS), pp. 5394–5403 (2012)

    Google Scholar 

  11. Schmidt, A.-D., et al.: Static analysis of executables for collaborative malware detection on android. In: ICC, pp. 1–5. IEEE (2009)

    Google Scholar 

  12. Jusoh, R., Firdaus, A., Anwar, S., Osman, M.Z., Darmawan, M.F., Ab Razak, M.F.: Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation). Peer J. Comput. Sci. 7, e522 (2021). https://doi.org/10.7717/peerj-cs.522

  13. Aafer, Y., Du, W., Yin, H.: DroidAPIMiner: mining API-level features for robust malware detection in Android. In: Proceedings of the 9th International Conference on Security and Privacy in Communication Networks, September 2013

    Google Scholar 

  14. Christodorescu, M., Jha, S., Kruegel, C.: Mining specifications of malicious behavior. In: Proceedings of the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering, ser. ESEC-FSE 2007, New York, NY, USA, pp. 5–14. ACM (2007)

    Google Scholar 

  15. Shanmukh, V.: Image Classification Using Machine Learning-Support Vector Machine (SVM), 3rd March 2021. https://medium.com/analytics-vidhya/image-classification-using-machine-learning-support-vector-machine-svm-dc7a0ec92e01. Accessed 25 Feb 2022

  16. Bailey, M., Oberheide, J., Andersen, J., Mao, Z.M., Jahanian, F., Nazario, J.: Automated classification and analysis of internet malware. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 178–197. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74320-0_10

    Chapter  Google Scholar 

  17. Shabtai, A., Elovici, Y.: Applying behavioral detection on android-based devices, October 2012

    Google Scholar 

  18. Portokalidis, G., Homburg, P., Anagnostakis, K., Bos, H.: Paranoid android: versatile protection for smartphones. In: Proceedings of the 26th Annual Computer Security Applications Conference, ser. ACSAC 2010, New York, NY, USA, pp. 347–356. ACM (2010). https://doi.org/10.1145/1920261.1920313

  19. Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, ser. SPSM 2011. New York, NY, USA, pp. 15–26. ACM (2011)

    Google Scholar 

  20. Au, K.W.Y., Zhou, Y.F., Huang, Z., Lie, D.: Pscout: analyzing the android permission specification. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, ser. CCS 2012, New York, NY, USA, pp. 217–228. ACM (2012)

    Google Scholar 

  21. Felt, A.P., Greenwood, K., Wagner, D.: The effectiveness of application permissions. In: Proceedings of the 2nd USENIX Conference on Web Application Development, ser. WebApps 2011, Berkeley, CA, USA, p. 7. USENIX Association (2011)

    Google Scholar 

  22. Davis, J., Goadrich, M.: The relationship between precision-recall and ROC curves. In: Proceedings of the 23rd International Conference on Machine Learning, ser. ICML 2006, New York, NY, USA, pp. 233–240. ACM (2006)

    Google Scholar 

  23. Yuan, Z., Lu, Y., Wang, Z., Xue, Y.: Droid-Sec: deep learning in an- droid malware detection. In: ACM SIGCOMM Computer Communication Review, vol. 44(4), pp. 371–372. ACM (2014)

    Google Scholar 

  24. Yuan, Z., Lu, Y., Xue, Y.: Droiddetector: android malware characterization and detection using deep learning. Tsinghua S. Technol. 21(1), 114–123 (2016)

    Article  Google Scholar 

  25. Worldpanel, K.: Smartphone OS market share (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hassan Kazemian .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kazemian, H. (2022). Machine Learning Approach to Detect Malicious Mobile Apps. In: Maglogiannis, I., Iliadis, L., Macintyre, J., Cortez, P. (eds) Artificial Intelligence Applications and Innovations. AIAI 2022. IFIP Advances in Information and Communication Technology, vol 647. Springer, Cham. https://doi.org/10.1007/978-3-031-08337-2_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-08337-2_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-08336-5

  • Online ISBN: 978-3-031-08337-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics