Experimental analysis of Android malware detection based on combinations of permissions and API-calls

被引:0
|
作者
Abhishek Kumar Singh
C. D. Jaidhar
M. A. Ajay Kumara
机构
[1] National Institute of Technology Karnataka,Department of Information Technology
[2] Amrita Vishwa Vidyapeetham,Department of Computer Science and Engineering, Amrita School of Engineering
关键词
Android; Feature selection; Malware detection; Static analysis;
D O I
暂无
中图分类号
学科分类号
摘要
Android-based smartphones are gaining popularity, due to its cost efficiency and various applications. These smartphones provide the full experience of a computing device to its user, and usually ends up being used as a personal computer. Since the Android operating system is open-source software, many contributors are adding to its development to make the interface more attractive and tweaking the performance. In order to gain more popularity, many refined versions are being offered to customers, whose feedback will enable it to be made even more powerful and user-friendly. However, this has attracted many malicious code-writers to gain anonymous access to the user’s private data. Moreover, the malware causes an increase of resource consumption. To prevent this, various techniques are currently being used that include static analysis-based detection and dynamic analysis-based detection. But, due to the enhancement in Android malware code-writing techniques, some of these techniques are getting overwhelmed. Therefore, there is a need for an effective Android malware detection approach for which experimental studies were conducted in the present work using the static features of the Android applications such as Standard Permissions with Application Programming Interface (API) calls, Non-standard Permissions with API-calls, API-calls with Standard and Nonstandard Permissions. To select the prominent features, Feature Selection Techniques (FSTs) such as the BI-Normal Separation (BNS), Mutual Information (MI), Relevancy Score (RS), and the Kullback-Leibler (KL) were employed and their effectiveness was measured using the Linear-Support Vector Machine (L-SVM) classifier. It was observed that this classifier achieved Android malware detection accuracy of 99.6% for the combined features as recommended by the BI-Normal Separation FST.
引用
收藏
页码:209 / 218
页数:9
相关论文
共 50 条
  • [41] URefFlow: A Unified Android Malware Detection Model Based on Reflective Calls
    Liu, Chao
    Li, Jianan
    Yu, Min
    Li, Gang
    Luo, Bo
    Chen, Kai
    Jiang, Jianguo
    Huang, Weiqing
    2018 IEEE 37TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2018,
  • [42] Android Malicious Application Detection Based on Ontology Technology Integrated with Permissions and System Calls
    Chen, Da
    Zhang, Hongmei
    Zhang, Xiangli
    Wang, Demin
    2016 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI), 2016, : 481 - 484
  • [43] NATICUSdroid: A malware detection framework for Android using native and custom permissions
    Mathur, Akshay
    Podila, Laxmi Mounika
    Kulkarni, Keyur
    Niyaz, Quamar
    Javaid, Ahmad Y.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58 (58)
  • [44] Merging Permission and API Features for Android Malware Detection
    Qiao, Mengyu
    Sung, Andrew H.
    Liu, Qingzhong
    PROCEEDINGS 2016 5TH IIAI INTERNATIONAL CONGRESS ON ADVANCED APPLIED INFORMATICS IIAI-AAI 2016, 2016, : 566 - 571
  • [45] Sequencing System Calls for Effective Malware Detection in Android
    Ahsan-Ul-Haque, A. S. M.
    Hossain, Md. Shohrab
    Atiquzzaman, Mohammed
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [46] RepassDroid: Automatic Detection of Android Malware Based on Essential Permissions and Semantic Features of Sensitive APIs
    Xie, Niannian
    Zeng, Fanping
    Qin, Xiaoxia
    Zhang, Yu
    Zhou, Mingsong
    Lv, Chengcheng
    PROCEEDINGS 2018 12TH INTERNATIONAL SYMPOSIUM ON THEORETICAL ASPECTS OF SOFTWARE ENGINEERING (TASE 2018), 2018, : 52 - 59
  • [47] Similarity-Based Hybrid Malware Detection Model Using API Calls
    Alhashmi, Asma A.
    Darem, Abdulbasit A.
    Alashjaee, Abdullah M.
    Alanazi, Sultan M.
    Alkhaldi, Tareq M.
    Ebad, Shouki A.
    Ghaleb, Fuad A.
    Almadani, Aloyoun M.
    MATHEMATICS, 2023, 11 (13)
  • [48] Feature mining and classifier selection for API calls-based malware detection
    Gheorghe Balan
    Ciprian-Alin Simion
    Dragoş Teodor Gavriluţ
    Henri Luchian
    Applied Intelligence, 2023, 53 : 29094 - 29108
  • [49] Feature mining and classifier selection for API calls-based malware detection
    Balan, Gheorghe
    Simion, Ciprian-Alin
    Gavrilut, Dragos Teodor
    Luchian, Henri
    APPLIED INTELLIGENCE, 2023, 53 (23) : 29094 - 29108
  • [50] API and Permission-based Classification System for Android Malware Analysis
    Park, Jungsoo
    Chun, Hojin
    Jung, Souhwan
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 930 - 935