An Android Malware Detection Technique Using Optimized Permission and API with PCA

作者: Suman R. Tiwari , Ravi U. Shukla

DOI: 10.1109/ICCONS.2018.8662939

关键词: Personally identifiable informationStatic analysisAndroid malwareFeature (computer vision)Feature extractionData miningSupport vector machinePermissionComputer scienceMalware

摘要: Almost 90% of world population use smartphone and stores their personal information into android device, According to Trend Micro™ survey, there are millions application which is affected with some kind malware steals user's information, hence We have proposed Malware detection technique based on static analysis, uses the API Permissions for in device. achieved 97.25% accuracy logistic regression 96.21 % support vector machine further without any pre-procession our dataset, when we pre processed dataset then obtained 97.72% Accuracy 350 features 94.69% 30 feature using machine. (Abstract)

参考文章(20)
Jagdish Chand Bansal, PK Singh, Mukesh Saraswat, Abhishek Verma, Shimpi Singh Jadon, Ajith Abraham, None, Inertia Weight strategies in Particle Swarm Optimization nature and biologically inspired computing. pp. 633- 640 ,(2011) , 10.1109/NABIC.2011.6089659
P.V. Shijo, A. Salim, Integrated Static and Dynamic Analysis for Malware Detection Procedia Computer Science. ,vol. 46, pp. 804- 811 ,(2015) , 10.1016/J.PROCS.2015.02.149
Mehedee Zaman, Tazrian Siddiqui, Mohammad Rakib Amin, Md. Shohrab Hossain, Malware detection in Android by network traffic analysis 2015 International Conference on Networking Systems and Security (NSysS). pp. 1- 5 ,(2015) , 10.1109/NSYSS.2015.7043530
Ekta Gandotra, Divya Bansal, Sanjeev Sofat, Malware Analysis and Classification: A Survey Journal of Information Security. ,vol. 5, pp. 56- 64 ,(2014) , 10.4236/JIS.2014.52006
Wei Wang, Xing Wang, Dawei Feng, Jiqiang Liu, Zhen Han, Xiangliang Zhang, Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection IEEE Transactions on Information Forensics and Security. ,vol. 9, pp. 1869- 1882 ,(2014) , 10.1109/TIFS.2014.2353996
Kshitij Shah, Dushyant Kumar Singh, A survey on data mining approaches for dynamic analysis of malwares international conference on green computing. pp. 495- 499 ,(2015) , 10.1109/ICGCIOT.2015.7380515
Zhenlong Yuan, Yongqiang Lu, Yibo Xue, DroidDetector: Android Malware Characterization and Detection Using Deep Learning Tsinghua Science & Technology. ,vol. 21, pp. 114- 123 ,(2016) , 10.1109/TST.2016.7399288
Hanlin Zhang, Yevgeniy Cole, Linqiang Ge, Sixiao Wei, Wei Yu, Chao Lu, Genshe Chen, Dan Shen, Erik Blasch, Khanh D. Pham, ScanMe mobile ACM SIGAPP Applied Computing Review. ,vol. 16, pp. 36- 49 ,(2016) , 10.1145/2924715.2924719
Sen Chen, Minhui Xue, Zhushou Tang, Lihua Xu, Haojin Zhu, StormDroid: A Streaminglized Machine Learning-Based System for Detecting Android Malware computer and communications security. pp. 377- 388 ,(2016) , 10.1145/2897845.2897860
Jyoti Malik, Rishabh Kaushal, CREDROID: Android malware detection by network traffic analysis Proceedings of the 1st ACM Workshop on Privacy-Aware Mobile Computing. pp. 28- 36 ,(2016) , 10.1145/2940343.2940348