Abstract
Expanded usage and prevalence of android apps allows developers of malware to create new ways in various applications to unleash malware in various packaged types. This malware causes various leakage of information and a loss of revenue. In addition, the discovered software is repeatedly launched by unethical developers after classifying the program as malware. Unluckily, the program still remains undetected even after being repackaged. In this research, the topic of repackaging was discussed, emphasizing the implementation based on source code using the bag-of-words algorithm and testing the findings through machine learning. The findings of the assessment demonstrate comparatively improved result in this aspect than the existing implantation based on source code by adapting the bag-of-words strategy and implementing some supplementary dataset preprocessing. A vocabulary for identifying the malicious code has been developed in this study. Bag-of-words was used to classify malware trends using custom implementation. The findings were instantiated using various algorithms of machine learning. The concept was eventually implemented in a practical application too. The suggested method sets out a fairly new methodology for examining source code for android malware to tackle repackaging of malware.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chia C, Choo K, Fehrenbacher D (2017) How cyber-savvy are older mobile device users?
Alavi A, Quach A, Zhang H, Marsh B, Haq F, Qian Z, Lu L, Gupta R (2017) Where is the weakest link? A study on security discrepancies between android apps and their website counterparts
Hutchinson S, Karabiyik U (2019) Forensic analysis of spy applications in android devices. [online] Scholarly Commons. Available at: https://commons.erau.edu/adfsl/2019/paperpresentation/3/
Sharmeen S, Huda S, Abawajy JH, Ismail WN, Hassan MM (2018) Malware threats and detection for industrial mobile-IoT networks. IEEE Access 6:15941–15957. https://doi.org/10.1109/access.2018.2815660
Buennemeyer TK, Nelson TM, Clagett LM, Dunning JP, Marchany RC, Tront JG (2008) Mobile device profiling and intrusion detection using smart batteries. In: Proceedings of the 41st annual hawaii international conference on system sciences (HICSS 2008). https://doi.org/10.1109/hicss.2008.319
Wang S, Chen Z, Yan Q, Yang B, Peng L, Jia Z (2019) A mobile malware detection method using behavior features in network traffic. J Netw Comput Appl 133:15–25. https://doi.org/10.1016/j.jnca.2018.12.014
Ghaffari F, Abadi M, Tajoddin A (2017) AMD-EC: anomalybased Android malware detection using ensemble classifiers. In: 2017 Iranian conference on electrical engineering (ICEE). https://doi.org/10.1109/iraniancee.2017.7985436
Mercaldo F, Nardone V, Santone A, Visaggio CA (2016) Download malware? No, thanks. In: Proceedings of the 4th FME workshop on formal methods in software engineering
Karbab EB, Debbabi M, Alrabaee S, Mouheb D (2016) DySign: dynamic fingerprinting for the automatic detection of android malware. In: 2016 11th international conference on malicious and unwanted software (MALWARE). https://doi.org/10.1109/malware.2016.7888739
Nath HV, Mehtre BM (2014) Static malware analysis using machine learning methods. In: Recent trends in computer networks with distributed systems security. Communications in computer and information science, pp 440–450.https://doi.org/10.1007/978-3-642-54525-2_39
Al-Maksousy HH, Weigle MC, Wang C (2018) NIDS: neural network oriented intrusion detection system. In: 2018 IEEE international symposium on technologies for homeland security (HST). https://doi.org/10.1109/ths.2018.8574174
Vij D, Balachandran V, Thomas T, Surendran R (2020) Gramac. In: Proceedings of the tenth ACM conference on data and application security and privacy. https://doi.org/10.1145/3374664.3379530
Milosevic N, Dehghantanha A, Choo K-KR (2017) Machine learning aided Android malware classification. Comput Electr Eng 61:266–274. https://doi.org/10.1016/j.compeleceng.2017.02.013
Damshenas M, Dehghantanha A, Choo K-KR, Mahmud R (2015) M0Droid: an android behavioral-based malware detection model. J Inf Privacy Secur 11(3):141–157. https://doi.org/10.1080/15536548.2015.1073510
Hasan MR, Begum A, Zamal FB, Rawshan L, Bhuiyan T (2020) Android malware detection by machine learning apprehension and static feature characterization. In: Bhuiyan T, Rahman M, Ali M (eds) Cyber security and computer science. ICONCS 2020. Lecture notes of the institute for computer sciences, social informatics and telecommunications engineering, vol 325. Springer, Cham. https://doi.org/10.1007/978-3-030-52856-0_5
VirusTotal (n.d.) Retrieved from https://www.virustotal.com/
Chan PPK, Song W-K (2014) Static detection of Android malware by using permissions and API calls. In: 2014 international conference on machine learning and cybernetics. https://doi.org/10.1109/icmlc.2014.7009096
Patanaik CK, Barbhuiya FA, Nandi S (2012). Obfuscated malware detection based on API call dependency. In: Proceedings of the first international conference on security of internet of things—SecurIT 12. https://doi.org/10.1145/2490428.2490454
Leeds M, Keffeler M, Atkison T (2017) A comparison of features for android malware detection. In: Proceedings of the SouthEast Conference on— ACM SE 17.https://doi.org/10.1145/3077286.3077288
Abraham A, Andriatsimandefitra R, Brunelat A, Lalande J-F, Tong VVT (2015) GroddDroid: a gorilla for triggering malicious behaviors. In: 2015 10th international conference on malicious and unwanted software (MALWARE). https://doi.org/10.1109/malware.2015.7413692
Bag-of-words model (2019, November 29) Retrieved from https://en.wikipedia.org/wiki/Bag-of-words_model
Acknowledgements
Co-authors of this previous research stated in [15] had good contribution for assessment of the identification of the core issue, which laid groundwork for this consecutive research work. Additionally, Associate Dean of the Faculty of Science and Information Technology (FSIT) of Daffodil International University—Prof. Dr. Md. Fokhray Hossain has always inspired me to continue my research in the intended field after my graduation from Daffodil International University.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Hasan, M.R. (2023). Android Malware Classification Addressing Repackaged Entities by the Evaluation of Static Features and Multiple Machine Learning Algorithms. In: Yang, XS., Sherratt, S., Dey, N., Joshi, A. (eds) Proceedings of Seventh International Congress on Information and Communication Technology. Lecture Notes in Networks and Systems, vol 448. Springer, Singapore. https://doi.org/10.1007/978-981-19-1610-6_3
Download citation
DOI: https://doi.org/10.1007/978-981-19-1610-6_3
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-1609-0
Online ISBN: 978-981-19-1610-6
eBook Packages: EngineeringEngineering (R0)