Experimental analysis of Android malware detection based on combinations of permissions and API-calls

被引:0
|
作者
Abhishek Kumar Singh
C. D. Jaidhar
M. A. Ajay Kumara
机构
[1] National Institute of Technology Karnataka,Department of Information Technology
[2] Amrita Vishwa Vidyapeetham,Department of Computer Science and Engineering, Amrita School of Engineering
关键词
Android; Feature selection; Malware detection; Static analysis;
D O I
暂无
中图分类号
学科分类号
摘要
Android-based smartphones are gaining popularity, due to its cost efficiency and various applications. These smartphones provide the full experience of a computing device to its user, and usually ends up being used as a personal computer. Since the Android operating system is open-source software, many contributors are adding to its development to make the interface more attractive and tweaking the performance. In order to gain more popularity, many refined versions are being offered to customers, whose feedback will enable it to be made even more powerful and user-friendly. However, this has attracted many malicious code-writers to gain anonymous access to the user’s private data. Moreover, the malware causes an increase of resource consumption. To prevent this, various techniques are currently being used that include static analysis-based detection and dynamic analysis-based detection. But, due to the enhancement in Android malware code-writing techniques, some of these techniques are getting overwhelmed. Therefore, there is a need for an effective Android malware detection approach for which experimental studies were conducted in the present work using the static features of the Android applications such as Standard Permissions with Application Programming Interface (API) calls, Non-standard Permissions with API-calls, API-calls with Standard and Nonstandard Permissions. To select the prominent features, Feature Selection Techniques (FSTs) such as the BI-Normal Separation (BNS), Mutual Information (MI), Relevancy Score (RS), and the Kullback-Leibler (KL) were employed and their effectiveness was measured using the Linear-Support Vector Machine (L-SVM) classifier. It was observed that this classifier achieved Android malware detection accuracy of 99.6% for the combined features as recommended by the BI-Normal Separation FST.
引用
收藏
页码:209 / 218
页数:9
相关论文
共 50 条
  • [21] Investigating the Android Intents and Permissions for Malware detection
    Idrees, Fauzia
    Rajarajan, Muttukrishnan
    2014 IEEE 10TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2014, : 354 - 358
  • [22] Android Malware Detection Based on System Calls Analysis and CNN Classification
    Abderrahmane, Abada
    Adnane, Guettaf
    Yacine, Challal
    Khireddine, Garri
    2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE WORKSHOP (WCNCW), 2019,
  • [23] Permissions-Based Detection of Android Malware Using Machine Learning
    Akbar, Fahad
    Hussain, Mehdi
    Mumtaz, Rafia
    Riaz, Qaiser
    Wahab, Ainuddin Wahid Abdul
    Jung, Ki-Hyun
    SYMMETRY-BASEL, 2022, 14 (04):
  • [24] Evaluation of Android Malware Detection Based on System Calls
    Dimjasevic, Marko
    Atzeni, Simone
    Rakamaric, Zvonimir
    Ugrina, Ivo
    IWSPA'16: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, 2016, : 1 - 8
  • [25] Permissions-based Android malware detection using machine learning
    Alomar, Atheer
    AlJarullah, Asma
    Abu-Ghazalah, Sarah
    Neural Computing and Applications, 2025, 37 (06) : 5255 - 5270
  • [26] IPDroid: Android Malware Detection using Intents and Permissions
    Khariwal, Kartik
    Singh, Jatin
    Arora, Anshul
    PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), 2020, : 197 - 202
  • [27] AndroPIn: Correlating Android Permissions and Intents for Malware Detection
    Idrees, Fauzia
    Rajarajan, Muttukrishnan
    Chen, Thomas M.
    Rahulamathavan, Yogachandran
    Naureen, Ayesha
    2017 8TH IEEE ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2017, : 394 - 399
  • [28] Malware classification based on API calls and behaviour analysis
    Pektas, Abdurrahman
    Acarman, Tankut
    IET INFORMATION SECURITY, 2018, 12 (02) : 107 - 117
  • [29] Mining Dominance Tree of API Calls for Detecting Android Malware
    Alam, Shahid
    Yildirim, Serdar
    Hassan, Mahamat
    Sogukpinar, Ibrahim
    2018 2ND INTERNATIONAL SYMPOSIUM ON MULTIDISCIPLINARY STUDIES AND INNOVATIVE TECHNOLOGIES (ISMSIT), 2018, : 192 - 195
  • [30] EAODroid: Android Malware Detection Based on Enhanced API Order
    Huang Lu
    Xue Jingfeng
    Wang Yong
    Qu Dacheng
    Chen Junbao
    Zhang Nan
    Zhang Li
    CHINESE JOURNAL OF ELECTRONICS, 2023, 32 (05) : 1169 - 1178