Bio-inspired for Features Optimization and Malware Detection

作者: Mohd Faizal Ab Razak , Nor Badrul Anuar , Fazidah Othman , Ahmad Firdaus , Firdaus Afifi

DOI: 10.1007/S13369-017-2951-Y

关键词:

摘要: The leaking of sensitive data on Android mobile device poses a serious threat to users, and the unscrupulous attack violates privacy users. Therefore, an effective malware detection system is necessary. However, detecting challenging due similarity permissions in with those seen benign applications. This paper aims evaluate effectiveness machine learning approach for malware. In this paper, we applied bio-inspired algorithm as feature optimization selecting reliable permission features that able identify attacks. A static analysis technique classifier developed from noted shows use potential detection. study compares [particle swarm (PSO)] evolutionary computation information gain find best features. were optimized 378 11 by using algorithm: particle (PSO). evaluation utilizes 5000 Drebin samples 3500 samples. recognizing malware, it appears AdaBoost achieve good accuracy true positive rate value 95.6%, permissions. results show (PSO)

参考文章(43)
Franklin Tchakounté, Permission-based Malware Detection Mechanisms on Android: Analysis and Perspectives Journal of Computer Science and Software Application. ,vol. 1, pp. 63- 77 ,(2014)
Yang Wang, Jun Zheng, Chen Sun, Srinivas Mukkamala, Quantitative Security Risk Assessment of Android Permissions and Applications Lecture Notes in Computer Science. pp. 226- 241 ,(2013) , 10.1007/978-3-642-39256-6_15
Hung-Jen Liao, Chun-Hung Richard Lin, Ying-Chih Lin, Kuang-Yuan Tung, Review: Intrusion detection system: A comprehensive review Journal of Network and Computer Applications. ,vol. 36, pp. 16- 24 ,(2013) , 10.1016/J.JNCA.2012.09.004
Yongguang Zhang, Wenke Lee, Yi-An Huang, Intrusion detection techniques for mobile wireless networks Wireless Networks. ,vol. 9, pp. 545- 556 ,(2003) , 10.1023/A:1024600519144
Laura Gheorghe, Bogdan Marin, Gary Gibson, Lucian Mogosanu, Razvan Deaconescu, Valentin‐Gabriel Voiculescu, Mihai Carabas, None, Smart malware detection on Android Security and Communication Networks. ,vol. 8, pp. 4254- 4272 ,(2015) , 10.1002/SEC.1340
Yousra Aafer, Wenliang Du, Heng Yin, DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. pp. 86- 103 ,(2013) , 10.1007/978-3-319-04283-1_6
Iftikhar Ahmad, Feature selection using particle swarm optimization in intrusion detection International Journal of Distributed Sensor Networks. ,vol. 2015, pp. 806954- ,(2015) , 10.1155/2015/806954
Asaf Shabtai, Uri Kanonov, Yuval Elovici, Chanan Glezer, Yael Weiss, Andromaly: a behavioral malware detection framework for android devices intelligent information systems. ,vol. 38, pp. 161- 190 ,(2012) , 10.1007/S10844-010-0148-X
Monowar H. Bhuyan, D. K. Bhattacharyya, J. K. Kalita, Network Anomaly Detection: Methods, Systems and Tools IEEE Communications Surveys and Tutorials. ,vol. 16, pp. 303- 336 ,(2014) , 10.1109/SURV.2013.052213.00046
Suleiman Y. Yerima, Gavin McWilliams, Sakir Sezer, Analysis of Bayesian classification-based approaches for Android malware detection Iet Information Security. ,vol. 8, pp. 25- 36 ,(2014) , 10.1049/IET-IFS.2013.0095