Browse > Article
http://dx.doi.org/10.13089/JKIISC.2014.24.4.617

Efficient Malware Detector for Android Devices  

Lee, Hye Lim (Graduate School of Information Security, Korea University)
Jang, Soohee (Graduate School of Information Security, Korea University)
Yoon, Ji Won (Graduate School of Information Security, Korea University)
Abstract
Smart phone usage has increased exponentially and open source based Android OS occupy significant market share. However, various malicious applications that use the characteristic of Android threaten users. In this paper, we construct an efficient malicious application detector by using the principle component analysis and the incremental k nearest neighbor algorithm, which consider an required permission, of Android applications. The cross validation is exploited in order to find a critical parameter of the algorithm. For the performance evaluation of our approach, we simulate a real data set of Contagio Mobile.
Keywords
Android Security; Malware Detection; Principal Component Analysis; kNN-Classification;
Citations & Related Records
연도 인용수 순위
  • Reference
1 "Mobile threat report q4 2012," F-Secure, 2012
2 "NQ mobile 2012 security report," NQ mobile, 2012
3 S. Y. Yerima, S. Sezer, G. McWilliams and I. Muttik, "A new android malware detection approach using bayesian classification," Advanced Information Networking and Applications (AINA), 2013 IEEE 27th International Conference on. IEEE, pp.121-128, 2013.
4 C. Kolbitsch, Anubis: Analyzing unknown binaries. URL {http://anubis. iseclab.org}
5 A. Reina, A. Fattori and L. Cavallaro, "A system call-centric analysis and stimulation technique to automatically reconstruct android malware behaviors," EuroSec, April. 2013.
6 Android, Android developers. URL {http://developer.android.com}
7 A. P. Felt, E. Chin, S. Hanna, D. song and D. Wagner. "Android permissions demystified," Proceedings of the 18th ACM conference on Computer and communications security, ACM, pp. 627-638, Oct, 2011.
8 D. Barber, "Machine learning a probabilistic approach," 2006.
9 Mila, Contagio mobile. URL {http://contagiominidump.blogspot.kr}
10 K. Forter, S. Monteleone, A. Calatroni, D. Roggen and G. Troster, "Incremental kNN classifier exploiting correct-error teacher for activity recognition," Machine Learning and Applications (ICMLA), 2010 Ninth International Conference on. IEEE, pp. 445-450, Dec. 2010.
11 "Gartner Says Smartphone Sales Grew 46.5 Percent in Second Quarter of 2013 and Exceeded Feature Phone Sales for First Time," Gartner, August, 2014