Dynamic Detection of Mobile Malware Using Smartphone Data and Machine Learning

被引:0
|
作者
de Wit, J. S. Panman [1 ]
Bucur, D. [1 ]
van der Ham, J. [1 ,2 ]
机构
[1] Univ Twente, Drienerlolaan 5, NL-7522 NB Enschede, Netherlands
[2] NCSC NL, The Hague, Netherlands
来源
关键词
Machine learning; sensor data; smartphones; classification;
D O I
10.1145/3484246
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile malware are malicious programs that target mobile devices. They are an increasing problem, as seen with the rise of detected mobile malware samples per year. The number of active smartphone users is expected to grow, stressing the importance of research on the detection of mobile malware. Detection methods for mobile malware exist but are still limited. In this article, we provide an overview of the performance of machine learning (ML) techniques to detect malware on Android, without using privileged access. The ML-classifiers use device information such as the CPU usage, battery usage, and memory usage for the detection of 10 subtypes of Mobile Trojans on the Android Operating System. We use a real-life dataset containing device and malware data from 47 users for a year (2016). We examine which features, i.e., aspects, of a device, are most important to monitor to detect (subtypes of) Mobile Trojans. The focus of this article is on dynamic hardware features. Using these dynamic features we apply state-of-the-art machine learning classifiers: Random Forest, K-Nearest Neighbour, and AdaBoost. We show classification results on different feature sets, making a distinction between global device features, and specific app features. None of the measured feature sets require privileged access. Our results show that the Random Forest classifier performs best as a general malware classifier: across 10 subtypes of Mobile Trojans, it achieves an F1 score of 0.73 with a False Positive Rate (FPR) of 0.009 and a False Negative Rate (FNR) of 0.380. The Random Forest, K-Nearest Neighbours, and AdaBoost classifiers achieve F1 scores above 0.72, an FPR below 0.02 and, an FNR below 0.33, when trained separately to detect each subtype of Mobile Trojans.
引用
收藏
页数:24
相关论文
共 50 条
  • [31] Detection of Malware in the Network Using Machine Learning Techniques
    Yogesh, B.
    Reddy, G.Suresh
    Proceedings - 2022 International Conference on Recent Trends in Microelectronics, Automation, Computing and Communications Systems, ICMACC 2022, 2022, : 204 - 211
  • [32] PDF Malware Detection Using Visualization and Machine Learning
    Liu, Ching-Yuan
    Chiu, Min-Yi
    Huang, Qi-Xian
    Sun, Hung-Min
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXV, 2021, 12840 : 209 - 220
  • [33] Malware Analysis and Detection Using Machine Learning Algorithms
    Akhtar, Muhammad Shoaib
    Feng, Tao
    SYMMETRY-BASEL, 2022, 14 (11):
  • [34] Android Malware Detection Using Machine Learning: A Review
    Chowdhury, Naseef-Ur-Rahman
    Haque, Ahshanul
    Soliman, Hamdy
    Hossen, Mohammad Sahinur
    Fatima, Tanjim
    Ahmed, Imtiaz
    INTELLIGENT SYSTEMS AND APPLICATIONS, VOL 3, INTELLISYS 2023, 2024, 824 : 507 - 522
  • [35] Scalable malware detection system using big data and distributed machine learning approach
    Manish Kumar
    Soft Computing, 2022, 26 : 3987 - 4003
  • [36] On machine learning effectiveness for malware detection in Android OS using static analysis data
    Syrris, Vasileios
    Geneiatakis, Dimitris
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 59
  • [37] Scalable malware detection system using big data and distributed machine learning approach
    Kumar, Manish
    SOFT COMPUTING, 2022, 26 (08) : 3987 - 4003
  • [38] On machine learning effectiveness for malware detection in Android OS using static analysis data
    Syrris, Vasileios
    Geneiatakis, Dimitris
    Journal of Information Security and Applications, 2021, 59
  • [39] A survey on dynamic mobile malware detection
    Ping Yan
    Zheng Yan
    Software Quality Journal, 2018, 26 : 891 - 919
  • [40] A survey on dynamic mobile malware detection
    Yan, Ping
    Yan, Zheng
    SOFTWARE QUALITY JOURNAL, 2018, 26 (03) : 891 - 919