Detection of Anomalous Behavior of Smartphone Devices using Changepoint Analysis and Machine Learning Techniques

被引:1
|
作者
Sanchez, Ricardo Alejandro Manzano [1 ]
Naik, Kshirasagar [1 ]
Albasir, Abdurhman [1 ]
Zaman, Marzia [2 ]
Goel, Nishith [2 ]
机构
[1] Univ Waterloo, 200 Univ Ave, Waterloo, ON N2L 3G1, Canada
[2] Cistel Technol Inc, 30 Concourse Gate, Nepean, ON, Canada
来源
关键词
Malware detection; non-parametric and parametric changepoint detection; power measurement; time-series; machine learning; Drebin dataset; ANDROID MALWARE DETECTION; ENERGY-CONSUMPTION;
D O I
10.1145/3492327
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Detecting anomalous behavior on smartphones is challenging sincemalware evolution. Othermethodologies detect malicious behavior by analyzing static features of the application code or dynamic data samples obtained from hardware or software. Static analysis is prone to code's obfuscation while dynamic needs that malicious activities to cease to be dormant in the shortest possible time while data samples are collected. Triggering and capturing malicious behavior in data samples in dynamic analysis is challenging since we need to generate an efficient combination of user's inputs to trigger these malicious activities. We propose a general model which uses a data collector and analyzer to unveil malicious behavior by analyzing the device's power consumption since this summarizes the changes in software. The data collector uses an automated tool to generate user inputs. The data analyzer uses changepoint analysis to extract features from power consumption and machine learning techniques to train these features. The data analyzer stage contains two methodologies that extract features using parametric and non-parametric changepoint. Our methodologies are efficient in data collection time than a manual method and the data analyzer provides higher accuracy compared to other techniques, reaching over 94% F1-measure for emulated and real malware.
引用
收藏
页数:28
相关论文
共 50 条
  • [31] Credit card fraud detection using Machine Learning Techniques: A Comparative Analysis
    Awoyemi, John O.
    Adetunmbi, Adebayo O.
    Oluwadare, Samuel A.
    PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON COMPUTING NETWORKING AND INFORMATICS (ICCNI 2017), 2017,
  • [32] Vibration analysis for fault detection in wind turbines using machine learning techniques
    Javier Vives
    Advances in Computational Intelligence, 2022, 2 (1):
  • [33] Android Applications Repackaging Detection Techniques for Smartphone Devices
    Rastogi, Sajal
    Bhushan, Kriti
    Gupta, B. B.
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 26 - 32
  • [34] Hardware Trojan Detection Using Changepoint-Based Anomaly Detection Techniques
    Elnaggar, Rana
    Chakrabarty, Krishnendu
    Tahoori, Mehdi B.
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2019, 27 (12) : 2706 - 2719
  • [35] Automated caries detection with smartphone color photography using machine learning
    Duong, Duc Long
    Kabir, Malitha Humayun
    Kuo, Rong Fu
    HEALTH INFORMATICS JOURNAL, 2021, 27 (02)
  • [36] Dynamic Detection of Mobile Malware Using Smartphone Data and Machine Learning
    de Wit, J. S. Panman
    Bucur, D.
    van der Ham, J.
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (02):
  • [37] Dynamic Mapping of Road Conditions using Smartphone Sensors and Machine Learning Techniques
    Gawad, Shahd Mohamed Abdel
    El Mougy, Amr
    El-Meligy, Menna Ahmed
    2016 IEEE 84TH VEHICULAR TECHNOLOGY CONFERENCE (VTC FALL), 2016,
  • [38] Smartphone based Early Detection of Epileptic Seizures Using Machine Learning
    Gupta, Shweta
    PROCEEDINGS OF 2020 12TH INTERNATIONAL CONFERENCE ON BIOINFORMATICS AND BIOMEDICAL TECHNOLOGY, ICBBT 2020, 2020, : 38 - 42
  • [39] Machine Learning Method for Changepoint Detection in Short Time Series Data
    Smejkalova, Veronika
    Somplak, Radovan
    Rosecky, Martin
    Sramkova, Kristina
    MACHINE LEARNING AND KNOWLEDGE EXTRACTION, 2023, 5 (04): : 1407 - 1432
  • [40] Detection of Phishing URLs Using Machine Learning Techniques
    James, Joby
    Sandhya, L.
    Thomas, Ciza
    2013 INTERNATIONAL CONFERENCE ON CONTROL COMMUNICATION AND COMPUTING (ICCC), 2013, : 304 - +