A Learning Model to Detect Android C&C Applications Using Hybrid Analysis

被引:1
|
作者
Qammar, Attia [1 ]
Karim, Ahmad [1 ]
Alharbi, Yasser [2 ]
Alsaffar, Mohammad [2 ]
Alharbi, Abdullah [2 ]
机构
[1] Bahauddin Zakariya Univ, Dept Informat Technol, Multan 60000, Pakistan
[2] Univ Hail, Coll Comp Sci & Engn, Hail 81451, Saudi Arabia
来源
关键词
Android botnet; botnet detection; hybrid analysis; machine learning classifiers; mobile malware; BOTNETS;
D O I
10.32604/csse.2022.023652
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Smartphone devices particularly Android devices are in use by billions of people everywhere in the world. Similarly, this increasing rate attracts mobile botnet attacks which is a network of interconnected nodes operated through the command and control (C&C) method to expand malicious activities. At present, mobile botnet attacks launched the Distributed denial of services (DDoS) that causes to steal of sensitive data, remote access, and spam generation, etc. Consequently, various approaches are defined in the literature to detect mobile botnet attacks using static or dynamic analysis. In this paper, a novel hybrid model, the combination of static and dynamic methods that relies on machine learning to detect android botnet applications is proposed. Furthermore, results are evaluated using machine learning classifiers. The Random Forest (RF) classifier outperform as compared to other ML techniques i.e., Naive Bayes (NB), Support Vector Machine (SVM), and Simple Logistic (SL). Our proposed framework achieved 97.48% accuracy in the detection of botnet applications. Finally, some future research directions are highlighted regarding botnet attacks detection for the entire community.
引用
收藏
页码:915 / 930
页数:16
相关论文
共 50 条
  • [1] HALNet: A Hybrid Deep Learning Model for Encrypted C&C Malware Traffic Detection
    Li, Ruiyuan
    Song, Zehui
    Xie, Wei
    Zhang, Chengwei
    Zhong, Guohui
    Pei, Xiaobing
    NETWORK AND SYSTEM SECURITY, NSS 2021, 2021, 13041 : 326 - 339
  • [2] Robust Android Botnet C&C over GTalk Service
    Shin, Jongho
    Cho, Yookun
    Eun, Seongbae
    Yun, Young-Sun
    Jung, Jinman
    JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (05): : 865 - 875
  • [3] C&C Festival of Hybrid Gifting
    Spence, Jocelyn
    Koleva, Boriana
    Flintham, Martin
    Thorn, Emily
    Glover, Kevin
    Gibson, Rebecca
    Benford, Steve
    Kwon, Hyosun
    Darzentas, Dimitrios
    Wagner, Hanne
    2023 PROCEEDINGS OF THE 15TH CONFERENCE ON CREATIVITY AND COGNITION, C&C 2023, 2023, : 8 - 12
  • [4] POSTER: Recoverable Botnets: A Hybrid C&C Approach
    Liao Peng
    Cui Xiang
    Li Shuhao
    Liu Chaoge
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 833 - 835
  • [5] Using Anomaly Detection Based Techniques to Detect HTTP-based Botnet C&C Traffic
    Sakib, Muhammad N.
    Huang, Chin-Tser
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [6] Detection in the Dark - Exploiting XSS Vulnerability in C&C Panels to Detect Malwares
    Nachum, Shay
    Schuster, Assaf
    Etzion, Opher
    CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING, CSCML 2018, 2018, 10879 : 227 - 242
  • [7] A New C&C Channel Detection Framework Using Heuristic Rule and Transfer Learning
    Jiang, Jianguo
    Yin, Qilei
    Shi, Zhixin
    Li, Meimei
    Lv, Bin
    2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2019,
  • [8] On the Security of Machine Learning in Malware C&C Detection: A Survey
    Gardiner, Joseph
    Nagaraja, Shishir
    ACM COMPUTING SURVEYS, 2016, 49 (03)
  • [9] Detecting C&C Server in the APT Attack based on Network Traffic using Machine Learning
    Cho Do Xuan
    Lai Van Duong
    Nikolaevich, Tisenko Victor
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (05) : 22 - 27
  • [10] Modeling Botnet C&C Traffic Lifespans from NetFlow Using Survival Analysis
    Oujezsky, Vaclav
    Horvath, Tomas
    Skorpil, Vladislav
    2016 39TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2016, : 50 - 55