Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2022.22.7.48

Generate Optimal Number of Features in Mobile Malware Classification using Venn Diagram Intersection  

Ismail, Najiahtul Syafiqah (Universiti Teknikal Malaysia Melaka)
Yusof, Robiah Binti (Universiti Teknikal Malaysia Melaka)
MA, Faiza (Universiti Teknikal Malaysia Melaka)
Publication Information
International Journal of Computer Science & Network Security / v.22, no.7, 2022 , pp. 389-396 More about this Journal
Abstract
Smartphones are growing more susceptible as technology develops because they contain sensitive data that offers a severe security risk if it falls into the wrong hands. The Android OS includes permissions as a crucial component for safeguarding user privacy and confidentiality. On the other hand, mobile malware continues to struggle with permission misuse. Although permission-based detection is frequently utilized, the significant false alarm rates brought on by the permission-based issue are thought to make it inadequate. The present detection method has a high incidence of false alarms, which reduces its ability to identify permission-based attacks. By using permission features with intent, this research attempted to improve permission-based detection. However, it creates an excessive number of features and increases the likelihood of false alarms. In order to generate the optimal number of features created and boost the quality of features chosen, this research developed an intersection feature approach. Performance was assessed using metrics including accuracy, TPR, TNR, and FPR. The most important characteristics were chosen using the Correlation Feature Selection, and the malicious program was categorized using SVM and naive Bayes. The Intersection Feature Technique, according to the findings, reduces characteristics from 486 to 17, has a 97 percent accuracy rate, and produces 0.1 percent false alarms.
Keywords
Mobile malware; Classification; Permissions; Intersection Technique; Intents;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Kumar, R. Shanker, and S. Verma, "Context aware dynamic permission model: A retrospect of privacy and security in android system," in Proceedings - 2nd International Conference on Intelligent Circuits and Systems, ICICS 2018, 2018, pp. 330-333.
2 A. Bhattacharya and R. T. Goswami, "A Hybrid Community Based Rough Set Feature Selection Technique in Android Malware Detection," in Smart Trends in Systems, Security and Sustainability., 2018, no. 18, pp. 249-258.
3 M. Hammad, H. Bagheri, and S. Malek, "DELDROID: An automated approach for determination and enforcement of least-privilege architecture in android," J. Syst. Softw., vol. 149, pp. 83-100, 2019.   DOI
4 A. Sadeghi, R. Jabbarvand, N. Ghorbani, H. Bagheri, and S. Malek, "A temporal permission analysis and enforcement framework for Android," in Proceedings of the 40th International Conference on Software Engineering - ICSE '18, 2018, pp. 846-857.
5 M. Yusof, M. M. Saudi, and F. Ridzuan, "A new mobile botnet classification based on permission and API calls," in Proceedings - 2017 7th International Conference on Emerging Security Technologies, EST 2017, 2017, pp. 122-127.
6 A. Talha and I. Alper, "An in-depth analysis of Android malware using hybrid techniques," Digit. Investig., vol. 24, pp. 25-33, 2018.   DOI
7 C. Wang and Y. Lan, "PFESG : Permission-based Android Malware Feature Extraction Algorithm," in ICNCC 2017: Proceedings of the 2017 VI International Conference on Network, Communication and Computing, 2017, pp. 106-109.
8 J. Cai, J. Luo, S. Wang, and S. Yang, "Feature selection in machine learning: A new perspective," Neurocomputing, vol. 300, pp. 70-79, 2018.   DOI
9 StatCounter, "Mobile Operating System Market Share Worldwide," StatCounter, 2021. .
10 Z. Abdullah and M. M. Saudi, "RAPID-Risk Assessment of Android Permission and Application Programming Interface ( API ) Call for Android Botnet," no. October, 2018.
11 R. Chang et al., "Towards a multilayered permissionbased access control for extending Android security," Concurr. Comput., vol. 30, no. 5, 2018.
12 H. Shahriar and M. Islam, "Android Malware Detection Using Permission Analysis," IEEE Conf. Proc., vol. 2017, no. SoutheastCon, pp. 1-6, 2017.
13 R. Kumar, X. Zhang, R. Khan, and A. Sharif, "Research on Data Mining of Permission-Induced Risk for Android IoT Devices," Appl. Sci., vol. 9, no. 2, p. 277, 2019.   DOI
14 W. Y. Lee, J. Saxe, and R. Harang, "SeqDroid: Obfuscated android malware detection using stacked convolutional and recurrent neural networks," Adv. Sci. Technol. Secur. Appl., pp. 197-210, 2019.
15 M. Fan, J. Liu, W. Wang, H. Li, Z. Tian, and T. Liu, "DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis," IEEE Trans. Inf. Forensics Secur., vol. 12, no. 8, pp. 1772-1785, 2017.   DOI
16 F. I. Abro, M. Rajarajana, and T. Chen, "Mobile Malware detection with permissions and intents analysis," p. 2014, 2014.
17 W. J. Buchanan, S. Chiale, and R. Macfarlane, "A methodology for the security evaluation within third-party Android Marketplaces," Digit. Investig., vol. 23, pp. 88-98, 2017.   DOI
18 F. Martinelli, F. Mercaldo, V. Nardone, A. Santone, and C. A. Visaggio, "Identifying mobile repackaged applications through formal methods," ICISSP 2017 - Proc. 3rd Int. Conf. Inf. Syst. Secur. Priv., vol. 2017-Janua, no. Icissp, pp. 673-682, 2017.
19 F. M. Faqiry, "Scrutinizing Permission Based Attack on Android Os Platform Devices," Int. J. Adv. Res. Comput. Sci., vol. 8, no. 7, pp. 421-426, 2017.   DOI
20 A. K. Chakravarty and S. Paul, "A study of signaturebased and behaviour-based malware detection approaches," Int. J. Adv. Res. Ideas Innov. Technol. ISSN, vol. 5, no. 3, pp. 1509-1511, 2019.
21 E. M. Karabulut, S. A. Ozel, and T. Ibrikci, "A comparative study on the effect of feature selection on classification accuracy," Procedia Technol., vol. 1, pp. 323-327, 2012.   DOI
22 H. Bagheri, E. Kang, S. Malek, and D. Jackson, "A formal approach for detection of security flaws in the android permission system," Form. Asp. Comput., vol. 30, no. 5, pp. 525-544, 2018.   DOI
23 B. F. Demissie, M. Ceccato, and L. K. Shar, "Security analysis of permission re-delegation vulnerabilities in Android apps," Empir. Softw. Eng., vol. 25, no. 6, pp. 5084-5136, 2020.   DOI
24 M. W. Afridi, T. Ali, T. Alghamdi, T. Ali, and M. Yasar, "Android application behavioral analysis through intent monitoring," in International Symposium on Digital Forensic and Security, ISDFS 2018, 2018, vol. 6, pp. 1-8.
25 A. Feizollah, N. B. Anuar, R. Salleh, G. Suarez-Tangil, and S. Furnell, "AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection," Comput. Secur., vol. 65, no., pp. 121-134, 2017.   DOI
26 A. Sharma and S. Dey, "Performance Investigation of Feature Selection Methods and Sentiment Lexicons for Sentiment Analysis," Int. J. Comput. Appl., no. June, pp. 15-20, 2012.
27 R. Kaur and M. Sachdeva, "Study and Comparison of Feature Selection Approaches for Intrusion Detection," in Proceedings on International Conference on Advances in Emerging Technology, 2016, vol. 2, pp. 1-7.
28 X. Liu and J. Liu, "A two-layered permission-based android malware detection scheme," Proc. - 2nd IEEE Int. Conf. Mob. Cloud Comput. Serv. Eng. MobileCloud, pp. 142-148, 2014.
29 S. Kandukuru and R. M. Sharma, "Android malicious application detection using permission vector and network traffic analysis," 2017 2nd Int. Conf. Converg. Technol. I2CT 2017, vol. 2017-Janua, pp. 1126-1132, 2017.
30 J. Duarte, "A Survey of Android Attacks Detection Techniques," in Digital Privacy and Security Conference (DPSC), 2020, no. February, pp. 106-117.
31 M. K. Alzaylaee, S. Y. Yerima, and S. Sezer, "Improving Dynamic Analysis of Android Apps Using Hybrid Test Input Generation," in International Conference On Cyber Security And Protection Of Digital Services, 2017, pp. 1-8.
32 C. Chen, J. Lin, and G.-H. Lai, "Detecting Mobile Application Malicious Behaviors Based on Data Flow of Source Code," in International Conference on Trustworthy Systems and their Applications Detecting, 2014, pp. 1-6.
33 C. La, P. Myo, and K. M. Myo, "Permission-based Feature Selection for Android Malware Detection and Analysis," Int. J. Comput. Appl., vol. 181, no. 19, pp. 29-39, 2018.   DOI
34 W. Wang, Z. Gao, M. Zhao, Y. Li, J. Liu, and X. Zhang, "DroidEnsemble: Detecting Android Malicious Applications with Ensemble of String and Structural Static Features," IEEE Access, vol. 6, no. c, pp. 31798-31807, 2018.   DOI
35 G. Kirubavathi and R. Anitha, "Structural analysis and detection of android botnets using machine learning techniques," Int. J. Inf. Secur., vol. 17, no. 2, pp. 153-167, 2018.   DOI
36 P. Feng, J. MA, C. SUN, X. XU1, and Y. MA, "A Novel Dynamic Android Malware Detection System With Ensemble Learning," IEEE Trans. JOURNALS, vol. 4, no. c, 2018.
37 V. Kouliaridis, G. Kambourakis, D. Geneiatakis, and N. Potha, "Two anatomists are better than one-Dual-level android malware detection," Symmetry (Basel)., vol. 12, no. 7, pp. 1-21, 2020.
38 M. Al Ali, D. Svetinovic, Z. Aung, and S. Lukman, "Malware Detection in Android Mobile Platform using Machine Learning Algorithms," in International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS), 2017, pp. 4-9.
39 P. Yan and Z. Yan, "A survey on dynamic mobile malware detection," Softw. Qual. J., vol. 26, no. 3, pp. 1-31, 2017.
40 D. O. Sahin, O. E. Kural, S. Akleylek, and E. Kilic, "A novel permission-based Android malware detection system using feature selection based on linear regression," Neural Comput. Appl., vol. 1, p. 5875, 2021.
41 J. Xiao, S. Chen, Q. He, Z. Feng, and X. Xue, "An Android application risk evaluation framework based on minimum permission set identification," J. Syst. Softw., vol. 163, p. 110533, 2020.   DOI
42 L. Shi, J. Fu, Z. Guo, and J. Ming, "'Jekyll and hyde' is risky: Shared-everything threat mitigation in dual-instance apps*," in MobiSys 2019 - Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services, 2019, pp. 225-235.
43 P. Wijesekera, A. Baokar, L. Tsai, and J. Reardon, "The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences," Proc. - IEEE Symp. Secur. Priv., pp. 1077-1093, 2017.