Bio-Inspired Computational Paradigm for Feature Investigation and Malware Detection: Interactive Analytics

作者: Ahmad Firdaus , Nor Badrul Anuar , Mohd Faizal Ab Razak , Arun Kumar Sangaiah

DOI: 10.1007/S11042-017-4586-0

关键词:

摘要: Recently, people rely on mobile devices to conduct their daily fundamental activities. Simultaneously, most of the prefer with Android operating system. As demand expands, deceitful authors develop malware compromise for private and money purposes. Consequently, security analysts have static dynamic analyses counter violation. In this paper, we adopt analysis which only requests minimal resource consumption rapid processing. However, finding a minimum set features in are vital because it removes irrelevant data, reduces runtime machine learning detection dimensionality datasets. Therefore, investigate three categories features, permissions, directory path, telephony. This investigation considers frequency as well repeatedly used each application. Subsequently, study evaluates proposed bio-inspired classifiers artificial neural network (ANN) category signify usefulness ANN type uncovering unknown malware. The multilayer perceptron (MLP), voted (VP) radial basis function (RBFN). Among all these classifiers, outstanding outcomes acquire is MLP, achieves 90% accuracy 87% true positive rate (TPR), 97% our Bio Analyzer prediction

参考文章(81)
Ali Feizollah, Shahaboddin Shamshirband, Nor Badrul Anuar, Rosli Salleh, Miss Laiha Mat Kiah, Anomaly Detection Using Cooperative Fuzzy Logic Controller FIRA RoboWorld Congress. pp. 220- 231 ,(2013) , 10.1007/978-3-642-40409-2_19
Borja Sanz, Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Pablo Garcia Bringas, Gonzalo Álvarez, PUMA: Permission Usage to Detect Malware in Android CISIS/ICEUTE/SOCO Special Sessions. pp. 289- 298 ,(2013) , 10.1007/978-3-642-33018-6_30
Monirul Sharif, Vinod Yegneswaran, Hassen Saidi, Phillip Porras, Wenke Lee, Eureka: A Framework for Enabling Static Malware Analysis european symposium on research in computer security. pp. 481- 500 ,(2008) , 10.1007/978-3-540-88313-5_31
Felix C. Freiling, Ali Ikinci, Thorsten Holz, Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients Sicherheit. pp. 407- 421 ,(2008)
William Enck, Defending users against smartphone apps: techniques and future directions international conference on information systems security. pp. 49- 70 ,(2011) , 10.1007/978-3-642-25560-1_3
Qaiser Abbas, Tehseen Zia, Muhammad Pervez Akhter, Comparative Study of Feature Selection Approaches for Urdu Text Categorization Malaysian Journal of Computer Science. ,vol. 28, pp. 93- 109 ,(2015)
Hyunjae Kang, Jae-wook Jang, Aziz Mohaisen, Huy Kang Kim, None, Detecting and classifying android malware using static analysis along with creator information International Journal of Distributed Sensor Networks. ,vol. 2015, pp. 479174- ,(2015) , 10.1155/2015/479174
Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan Clarke, Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM) Security and Communication Networks. ,vol. 6, pp. 1087- 1116 ,(2013) , 10.1002/SEC.673
Chun-Ying Huang, Yi-Ting Tsai, Chung-Han Hsu, Performance Evaluation on Permission-Based Detection for Android Malware Advances in Intelligent Systems and Applications - Volume 2. pp. 111- 120 ,(2013) , 10.1007/978-3-642-35473-1_12
Yousra Aafer, Wenliang Du, Heng Yin, DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. pp. 86- 103 ,(2013) , 10.1007/978-3-319-04283-1_6