Browse > Article
http://dx.doi.org/10.13089/JKIISC.2020.30.3.357

Advanced Feature Selection Method on Android Malware Detection by Machine Learning  

Boo, Joo-hun (Graduate School of Information Security, Korea University)
Lee, Kyung-ho (Graduate School of Information Security, Korea University)
Abstract
According to Symantec's 2018 internet security threat report, The number of new mobile malware variants increased by 54 percent in 2017, as compared to 2016. And last year, there were an average of 24,000 malicious mobile applications blocked each day. Existing signature-based technologies of malware detection have limitations. So, malware detection technique through machine learning is being researched to detect malware variant. However, even in the case of applying machine learning, if the proper features of the malware are not properly selected, the machine learning cannot be shown correctly. We are focusing on feature selection method to find the features of malware variant in this research.
Keywords
Android; Malware; Machine Learning; Feature Selection;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Gartner, "Gartner Says Huawei Secured No. 2 Worldwide Smartphone Vendor Spot, Surpassing Apple in Second Quarter 2018" https://www.gartner.com/en/newsroom/press-releases/2018-08-28-gartner-says-huawei-secured-no-2-worldwide-smartphone-vendor-spot-surpassing-apple-in-second-quarter, (accessed 09. 08. 2019).
2 Avast blog, "Mobile threats today" https://blog.avast.com/avast-mobile-t hreat-predictions, (accessed 09. 08. 2019).
3 Symantec, "Symantec internet security threat report," ISTR-23-2018, p.2, Mar. 2018.
4 Jin-Gul Joo, In-Seon Jeong, Seung-Ho Kang, "An Optimal Feature Selection Method to Detect Malwares in Real Time Using Machine Learning," Journal of Korea, Multimedia Society, vol. 22, no. 2, pp. 203-209, Feb. 2019.   DOI
5 Darell JJ Tan, Tong-Wei Chua, Vrizlynn LL Thing, et al. "Securing android: A survey, taxonomy, and challenges," ACM Comput. Surv, vol. 47, no. 4, Article 58, p. 45, May. 2015.
6 K. Rieck, T. Holz, C. Willems, P. Dussel and P. Laskov, "Learning and classification of malware behavior," Proceeding of the International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 108-125, Jul. 2008.
7 M.H. Nguyen, D.L. Nguyen, X.M. Nguyen, and T.T. Quan, "Auto- Detection of Sophisticated Malware Using Lazy-Binding Control Flow Graph and Deep Learning," Computers and Security, vol. 76, pp.128-155, Jul. 2018.   DOI
8 B. Sun, Q. Li, Y. Quo, Q. Wen, X. Lin and W. Liu, "Malware family classification method based on static feature extraction," Proceeding of the 3rd IEEE International Conference on Computer and Communications (ICCC), pp. 507-513, Dec. 2017.
9 M. Ahmadi, D. Ulyanov, S. Semenov, M. Trofimov and G. Giacinto, "Novel feature extraction, selection and fusion for effective malware family classification," Proceedings of the 6th ACM conference on data and application security and privacy, pp. 183-194, Mar. 2016.
10 R. Veeramani, and N. Rai. "Windows API based malware detection and framework analysis," International Conference on Networks and Cyber Security, pp. 25-29, Jan. 2012.
11 C.I. Rene and J. Abdullah, "Malicious Code Intrusion Detection Using Machine Learning And Indicators of Compromise," International Journal of Computer Science and Information Security, vol. 15, no. 9, pp. 160-171, Sep. 2017.
12 P. Singhal and N. Raul, "Malware Detection Module Using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks," International Journal of Network Security and Its Applications, vol. 4, no. 1, pp. 61-67, Feb. 2012.   DOI
13 Karthik Raman, "Selecting Features to Classify Malware," InfoSec Southwest, Mar. 2012.
14 Lei Wang, Xin Yan, et al, "Prediction of RNA-Protein Interactions by Combining Deep Convolutional Neural Network with Feature Selection Ensemble Method," Journal of Theoretical Biology, vol. 461, pp. 230-238, Jan. 2019.   DOI
15 Yingxian Chang et al, "Vulnerability Parser: A Static Vulnerability Analysis System for Android Applications," Journal of Physics: Conference Series, vol. 1288, 012053, no. 1, Aug. 2019.   DOI
16 The Android Open Source Project, "DexDalvik Executable Format" https://source.android.com/devices/tech/dalvik/dex-format, (accessed 09. 08. 2019).
17 L L et al, "Static analysis of android apps: A systematic literature review," Information and Software Technology, vol. 88, pp. 67-95, Aug. 2017.   DOI
18 Isabelle Guyon, Andre Elisseeff, "An Introduction to Variable and Feature Selection," Journal of Machine Learning Research 3, pp. 1157-1182, Mar. 2003.
19 Isabelle Guyon, Andre Elisseeff, "An introduction to feature extraction," Feature extraction, Studies in Fuzziness and Soft Computing, vol, 207, pp. 1-25, 2006.   DOI
20 Scott Schneider, Kent Griffin, "Modeling goodware characteristics to reduce false positive malware signatures," US Patent 8,028,338, Sep. 2011.
21 Zarni Aung, Win Zaw, "Permission-Based Android Malware Detection," International Journal of Scientific & Technology Research, vol. 2, ISSUE 3, pp. 228-234, Mar. 2013.
22 Christina Eusanio, "Machine Learning for the Detection of Mobile Malware on Android Devices," Proceedings of the Second Annual Data Science Symposium, Mercyhurst University, Erie, PA, pp. 19-23, May. 2019.
23 Vipin Kumar, Sonajharia Minz "Feature Selection: A literature Review," Smart Computing Review, vol. 4, no. 3, pp. 211-229, Jun. 2014.
24 Android Developer, "Manifest" https://developer.android.com/guide/topics/manifest/manifest-intro, (accessed 09. 08. 2019).
25 Fairuz Amalina Narudin, Ali Feizollah, Nor Badrul Anuar, Abdullah Gani, "Evaluation of machine learning classifiers for mobile malware detection," Soft Computing, pp. 343-357, Jan. 2016.
26 Keith Makan and Scott Alexander-Bown, Android Security Cookbook, Packt Publishing, Dec. 2013.
27 Androguard, "androguard", https://github.com/androguard/androguard, (accessed 09. 08. 2019).
28 Joo-ho In, Jung-ho Kim, Soo-hoan Chae, "Combined Feature Set and Hybrid Feature Selection Method for Effective Document Classification," Journal of Internet Computing and Services,v.14 no.5, pp. 49-57, Oct. 2013.   DOI
29 Information Security R&D Data Challenge, "Mobile malware" https://www.kisis.or.kr/kisis/subIndex/282.do, (accessed 09. 08. 2019).
30 Android Developer, "Safetynet" https://developer.android.com/training/safetynet, (accessed 09. 08. 2019).