Research Article
BibTex RIS Cite

Malware Detection in Android OS using Machine Learning Techniques

Year 2020, Volume: 3 Issue: 2, 5 - 9, 31.12.2020

Abstract

Malware is a software that is created to distort or obstruct computer or mobile applications, gather sensitive information or execute malicious actions. These malicious activities include increasing access through personal information, stealing this valuable information from the system, spying on a user’s activity, and displaying unwanted ads. Nowadays, mobile devices have become an essential part of our times, therefore we always need active algorithms for malware detection. In this paper, supervised machine learning techniques (SMLTs):Random Forest (RF), support vector machine(SVM), Naïve Bayes (NB)and decision tree(ID3) are applied in the detection of malware on Android OS and their performances have been compared. These techniques rely on Java APIs as well as the permissions required by employment as features to generalize their behavior and differentiate whether it is benign or malicious. The experimentation of results proves that RF has the highest performance with an accuracy rate of 96.2%

References

  • Tabii, işte düzeltilmiş referanslar:
  • [1] M. Sarwa and T. R. Soomro, “Impact of Smartphone’s on Society”, European Journal of Scientific Research, vol. 98, no. 2, pp. 216-226, 2013.
  • [2] S. Ali, S. Khusro, A. Rauf, and S. Mahfooz, “Sensors and Mobile Phones: Evolution and State-of-the-Art”, Pakistan Journal of Science, vol. 66, no. 4, pp. 386-400, 2013.
  • [3] N. D. Lane, E. Miluzzo, H. Lu, D. Peebles, T. Choudhury, and A. T. Campbell, “A survey of mobile phone sensing”, IEEE Communications Magazine, vol. 48, no. 9, pp. 140-150, 2010.
  • [4] M. Kedziora, P. Gawin, M. Szczepanik, and I. Jozwiak, “Android Malware Detection Using Machine Learning and Reverse Engineering”, Signal, Image Processing and Pattern Recognition Conference, Sydney, Australia, 22-23 December 2018.
  • [5] GSMA Report: “The Mobile Economy 2019.pdf”, 2019.
  • [6] T. Grønli, J. Hansen, G. Ghinea, and M. Younas, “Mobile application platform heterogeneity: Android vs Windows Phone vs iOS vs Firefox OS”, IEEE 2014 Advanced Information Networking and Applications (AINA) Conference, Victoria, Canada, 13-16 May 2014.
  • [7] B. Padhya, P. Desai, and D. Pawade, “Comparison of Mobile Operating Systems”, International Journal of Innovative Research in Computer and Communication Engineering, vol. 4, no. 8, pp. 15281-15286, 2016.
  • [8] P. Unuchek, “SecurityList,” Kaspersky Lab, Available online: https://securelist.com/pocketcryptofarms/85137/, 2018.
  • [9] B. Ganesh, A. Chakrabarti, and D. Midhunchakkaravarthy, “A Survey on Various Mobile Malware Attacks and Security Characteristics”, International Journal of Latest Trends in Engineering and Technology, vol. 8, no. 2, pp. 448-454, 2017.
  • [10] J. Sahs, and L. Khan, “A Machine Learning Approach to Android Malware Detection”, European Intelligence and Security Informatics Conference, Odense, Denmark, 22-24 August 2012.
  • [11] M. K. Alzaylaee, S. Y. Yerima, and S. Sezer, “DL-Droid: Deep learning based android malware detection using real devices”, Computers & Security Journal, vol. 89, no. 1, pp. 1-6, 2020.
  • [12] B. Zohuri, and F. M. Rahmani, “Artificial Intelligence Driven Resiliency with Machine Learning and Deep Learning Components”, International Journal of Nanotechnology & Nanomedicine, vol. 4, no. 2, pp. 1-8, 2019.
  • [13] T. Tiwari, T. Tiwari, and S. Tiwari, “How Artificial Intelligence, Machine Learning and Deep Learning are Radically Different?”, International Journal of Advanced Research in Computer Science and Software Engineering, vol. 8, no. 2, pp. 01-09, 2018.
  • [14]I. Martín, J. A. Hernández, A. Muñoz, and A. Guzmán, “AndroidMalware Characterization Using Metadata and Machine Learning Techniques”. Security and Communication Networks-Hindawi, Article ID 5749481, pp.1-12, 2018 Tabii, işte düzeltilmiş referanslar:
  • [15] S. Rana, C. Gudla, and A. H. Sung, “Evaluating Machine Learning Models for Android Malware Detection–A Comparison Study”, Network Communication & Computing (ICNCC) Conference, Taipei, Taiwan, 14-16 December 2018.
  • [16] R. Riasat, M. Sakeena, C. Wang, A. H. Sadiq, Y. J. Wang, “A Survey on Android Malware Detection Techniques”, Wireless Communication and Network Engineering (WCNE 2016) Conference, Beijing, China, 20-21 November 2016.
  • [17] K. Bakour, H. M. Ünver, and R. Ghanem, “The Android malware detection systems between hope and reality”, SN Applied Sciences, 1120, August 2019.
  • [18] W. D. Jie, M. C. Hao, W. T. En, L. H. Ming, and W. K. Ping, “DroidMat: Android malware detection through manifest and API calls tracing”, Information Security (Asia JCIS) Conference, Tokyo, Japan, 9-10 August 2012.
  • [19] M. Al Ali, D. Svetinovic, Z. Aung, and S. Lukman, “Malware detection in Android mobile platform using machine learning algorithms”, IEEE Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS) Conference, Dubai, United Arab Emirates, 18-20 December 2017.
  • [20] S. Arshad, A. Khan, M. A. Shah, and M. Ahmed, “Android Malware Detection & Protection: A Survey, International Journal of Advanced Computer Science and Applications,” vol. 7, no. 2, pp. 463-475, 2016.
  • [21] Z. R. Alkindi, M. Sarrab, and N. Alzidi, “Android Application Permission Model: Issues and Privacy Violation,” Free And Open Source Software (Fossc’2019) Conference, February 2019.
  • [22] X. Liu, and J. Liu, “A Two-layered Permission-based Android Malware Detection Scheme”, Mobile Cloud Computing, Services, and Engineering Conference, Oxford, UK, 8-11 April 2014.
  • [23] X. Jiang, B. Mao, J. Guan, and X. Huang, “Android Malware Detection Using Fine-Grained Features,” Scientific Programming-Hindawi, vol. 2020, Article ID 5190138.
  • [24] H. Fereidooni, M. Conti, D. Yao, and A. Sperduti, “ANASTASIA: ANdroidmAlware detection using STaticanalySIs of Applications”, IFIP New Technologies, Mobility & Security (NTMS) Conference, Larnaca, Cyprus, 21-23 November 2016.
  • [25] M. Hall, E. Frank, G. Holmes, and B. Pfahringer, “The WEKA Data Mining Software: An Update”, SIGKDD Explorations, Vol. 11, no. 1, pp. 10-18, 2009.
There are 26 citations in total.

Details

Primary Language English
Subjects Artificial Life and Complex Adaptive Systems
Journal Section Research Article
Authors

Maad M Mijwil This is me

Publication Date December 31, 2020
Published in Issue Year 2020 Volume: 3 Issue: 2

Cite

IEEE M. M. Mijwil, “Malware Detection in Android OS using Machine Learning Techniques”, International Journal of Data Science and Applications, vol. 3, no. 2, pp. 5–9, 2020.

AI Research and Application Center, Sakarya University of Applied Sciences, Sakarya, Türkiye.