[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2791405.2791417acmotherconferencesArticle/Chapter ViewAbstractPublication PageswciConference Proceedingsconference-collections
research-article

Malware Detection in Android files based on Multiple levels of Learning and Diverse Data Sources

Published: 10 August 2015 Publication History

Abstract

Smart mobile device usage has expanded at a very high rate all over the world. Mobile devices have experienced a rapid shift from pure telecommunication devices to small ubiquitous computing platforms. They run sophisticated operating systems that need to confront the same risks as desktop computers, with Android as the most targeted platform for malware. The processing power is one of the factors that differentiate PC's and mobile phones. Mobile phones are more compact and therefore limited in memory and depend on a limited battery power for their energy needs. Hence developing apps to run on these devices should take into consideration the above mentioned factors. To improve the speed of detection, a multilevel detection mechanism using diverse data sources is designed for detecting malware balancing between the accuracy of detection and usage of less compute intensive computations. In this work we have analyzed android based malware for analysis and a multilevel detection mechanism is designed using diverse data sources. We have evaluated our work on a collection of Android based malware comprising of different malware families and our results show that the proposed method is faster with good performance

References

[1]
Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11520862.pdf, 2013.
[2]
Kaynak, C & Alpaydin, E. Multistage cascading of multiple classifiers One mans noise is another mans data. Proceedings of the International Conference on Machine Learning. 2000. pp. 455--462.
[3]
Breiman, Leo. Bagging predictors. Machine learning 24.2 (1996): 123--140.
[4]
Schapire, Robert E. The boosting approach to machine learning: An overview. Nonlinear estimation and classification. Springer New York, 2003. 149--171.
[5]
Viola, P & Jones, M. Rapid object detection using a boosted cascade of simple features, Proceedings of the IEEE Computer Society Conference in Computer Vision and Pattern Recognition (CVPR), 2001, vol. 1, pp. 1--511
[6]
Shirazi, MH & Vasconcelos, NHigh detection-rate cascades for real-time object detection, Proceedings of the eleventh International Conference in Computer Vision, 2007, pp. 1--6.
[7]
Brubaker, SC, Wu, J, Sun, J, Mullin, MD & Rehg, JM, On the design of cascades of boosted ensembles for face detection, International Journal of Computer Vision, vol. 77, 2008, no. 1-3, pp. 65--86.
[8]
Raykar, VC, Krishnapuram, B & Yu, S, Designing effcient cascaded classifiers: Trade-of between accuracy and cost, Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, 2010, pp. 853--860
[9]
Xiang, G, Toward a phish free world: A feature-type-aware cascaded learning framework for phish detection. Ph.D. thesis, Carnegie Mellon University, 2013.
[10]
Dini, G, Martinelli, F, Saracino, A & Sgandurra, D, Madam: a multi-level anomaly detector for android malware, Proceedings of the Computer Network Security in Springer Berlin Heidelberg, 2012 pp. 240--253.
[11]
Sanz, B, Santos, I, Pedrero, UX, Laorden, C, Nieves, J & Bringas, PG, Anomaly Detection Using String Analysis for Android Malware Detection, In International Joint Conference SOCO 13-CISIS 13-ICEUTE 13, 2014, Springer International Publishing, pp. 469--478.
[12]
Felt, AP, Chin, E, Hanna, S, Song, D & Wagner, D, Android permissions demystifed, In Proceeding of ACM Conference on Computer and Communications Security (CCS), 2011, pp. 627--638.
[13]
Xu, W, Zhang, F, & Zhu, S, Permlyzer: Analyzing permission usage in Android applications, In IEEE 24th International Symposium on Software Reliability Engineering (ISSRE), 2013, pp. 400--410.
[14]
Zhou, Y & Jiang, X, Dissecting android malware: Characterization and evolution, Proceedings of the IEEE Symposium on Security and Privacy (SP), 2012, pp. 95--109.
[15]
Moonsamy, V, Rong, J & Liu, S, Mining permission patterns for contrasting clean and malicious android applications, Future Generation Computer Systems, vol. 36, 2014, pp. 122--132.
[16]
Morris, BT & Trivedi, MM, Learning, modeling, and classification of vehicle track patterns from live video, IEEE Transactions on Intelligent Transportation Systems, vol. 9, no. 3, 2008, pp. 425--437
[17]
Genome project 2012, Available from http://www.malgenomeproject.org/policy.html
[18]
Kira, K & Rendell, LA, The feature selection problem: Traditional methods and a new algorithm, Proceedings of the AAAI, 1992, pp. 129--134
[19]
Hall, M & Frank, E, Holmes, G, Pfahringer, B, Reutemann, P & Witten, IH, The WEKA Data Mining Software: An Update, SIGKDD Explorations, vol. 11, no 1, 2009, pp. 10--18.

Cited By

View all
  • (2023)A Survey and Evaluation of Android-Based Malware Evasion Techniques and Detection FrameworksInformation10.3390/info1407037414:7(374)Online publication date: 30-Jun-2023
  • (2021)Tight Arms Race: Overview of Current Malware Threats and Trends in Their DetectionIEEE Access10.1109/ACCESS.2020.30483199(5371-5396)Online publication date: 2021
  • (2018)SAFEDroid: Using Structural Features for Detecting Android MalwaresSecurity and Privacy in Communication Networks10.1007/978-3-319-78816-6_18(255-270)Online publication date: 25-Apr-2018
  • Show More Cited By

Index Terms

  1. Malware Detection in Android files based on Multiple levels of Learning and Diverse Data Sources

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      WCI '15: Proceedings of the Third International Symposium on Women in Computing and Informatics
      August 2015
      763 pages
      ISBN:9781450333610
      DOI:10.1145/2791405
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 10 August 2015

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Android
      2. Malware
      3. Multifeature
      4. Multilevel
      5. Ubiquitous

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      WCI '15

      Acceptance Rates

      WCI '15 Paper Acceptance Rate 98 of 452 submissions, 22%;
      Overall Acceptance Rate 98 of 452 submissions, 22%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 07 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)A Survey and Evaluation of Android-Based Malware Evasion Techniques and Detection FrameworksInformation10.3390/info1407037414:7(374)Online publication date: 30-Jun-2023
      • (2021)Tight Arms Race: Overview of Current Malware Threats and Trends in Their DetectionIEEE Access10.1109/ACCESS.2020.30483199(5371-5396)Online publication date: 2021
      • (2018)SAFEDroid: Using Structural Features for Detecting Android MalwaresSecurity and Privacy in Communication Networks10.1007/978-3-319-78816-6_18(255-270)Online publication date: 25-Apr-2018
      • (2017)Vulnerability detection in recent Android apps: An empirical study2017 International Conference on Networking, Systems and Security (NSysS)10.1109/NSysS.2017.7885802(55-63)Online publication date: Jan-2017
      • (2016)CypiderProceedings of the 32nd Annual Conference on Computer Security Applications10.1145/2991079.2991124(348-362)Online publication date: 5-Dec-2016
      • (2016)ScanMe mobileACM SIGAPP Applied Computing Review10.1145/2924715.292471916:1(36-49)Online publication date: 14-Apr-2016
      • (2016)Android malware detection with weak ground truth data2016 IEEE International Conference on Big Data (Big Data)10.1109/BigData.2016.7841008(3457-3464)Online publication date: Dec-2016

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media