Browse > Article
http://dx.doi.org/10.7840/kics.2014.39C.8.738

Linear SVM-Based Android Malware Detection and Feature Selection for Performance Improvement  

Kim, Ki-Hyun (Dept. of Computer Science, Kangwon National University)
Choi, Mi-Jung (Dept. of Computer Science, Kangwon National University)
Abstract
Recently, mobile users continuously increase, and mobile applications also increase As mobile applications increase, the mobile users used to store sensitive and private information such as Bank information, location information, ID, password on their mobile devices. Therefore, recent malicious application targeted to mobile device instead of PC environment is increasing. In particular, since the Android is an open platform and includes security vulnerabilities, attackers prefer this environment. This paper analyzes the performance of malware detection system applying linear SVM machine learning classifier to detect Android malware application. This paper also performs feature selection in order to improve detection performance.
Keywords
Android; Malware Detection; Feature Selection; SVM(Support Vector Machine);
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 J. Kim and E. Im, "Android malware detection using dynamic analysis in virtual system," in Proc. KICS Conf., pp. 816-817, 2012.
2 AhnLab, Security Center, "ASEC Report 2013," vol. 48, 2013.
3 F-Secure, "Mobile Threat Report Q1 2014," 4, 2014.
4 B. Amos, H. Turner, and J. White, "Applying machine learning classifiers to dynamic android malware detection at scale," IEEE Int. Wirel. Commun. Mobile Computing Conf. (IWCMC), pp. 1666-1671, Sardinia, Jul. 2013.
5 A. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, and Y. Weiss, "Andromaly: A behavioral malware detection framework for android devices," J. Intell. Inf. Syst., vol. 38, no. 1, pp. 161-190, 2012.   DOI
6 J. Park, and M. Kim, "Usage patterns and market development of smartphone," in Proc. IEIE Conf., pp. 572-575, 2013.
7 M. Choi, C. Jin, and M. Kim, "Classification of client-side application-level HTTP traffic," J. KICS, vol. 36, no. 11, pp. 1277-1284, 2011.   과학기술학회마을   DOI   ScienceOn
8 J. Park, S. Yoon, J. Park, H. Lee, S. Lee, and M. Kim, "Performance improvement of the payload signature based traffic classification system," J. KICS, vol. 35, no. 9, pp. 1287-1294, 2010.   과학기술학회마을
9 H. S. Ham, and M. J. Choi, "Analysis of android malware detection performance using machine learning classifiers," Int. Conf. ICT Convergence, pp. 490-495, Jeju Island, Korea, Oct. 2013.
10 R. M. Elbasiony, E. A. Sallam, T. E. Eltobely, and M. M. Fahmy, "A hybrid network intrusion detection framework based on random forests and weighted k-means," J. Ain Shams Eng., vol. 4, no. 4, pp. 753-762, 2013.   DOI   ScienceOn
11 Y. Fledel, A. Shabtai, D. Potashnik, and Y. Elovici, "Google android: an updated security review," Mobile Comput., Appl. Serv., Springer Berlin Heidelberg, vol. 76, pp. 401-414, 2012.   DOI