Android Malware Detection Through Permission and App Component Analysis Using Machine Learning Algorithms

Android Malware Detection Through Permission and App Component Analysis Using Machine Learning Algorithms

Improvement in technology has inevitably altered the tactic of criminals to thievery. In recent times, information is the real commodity and it is thus subject to theft as any other possessions: cryptocurrency, credit card numbers, and illegal digital material are on the top. If globally available platforms for smartphones are considered, the Android open source platform (AOSP) emerges as a prevailing contributor to the market and its popularity continues to intensify. Whilst it is beneficiary for users, this development simultaneously makes a prolific environment for exploitation by immoral developers who create malware or reuse software illegitimately acquired by reverse engineering. Android malware analysis techniques are broadly categorized into static and dynamic analysis. Many researchers have also used feature-based learning to build and sustain working security solutions. Although Android has its base set of permissions in place to protect the device and resources, it does not provide strong enough security framework to defend against attacks. This thesis presents several contributions in the domain of security of Android applications and the data within these applications. First, a brief survey of threats, vulnerability and security analysis tools for the AOSP is presented. Second, we develop and use a genre extraction algorithm for Android applications to check the availability of those applications in Google Play Store. Third, an algorithm for extracting unclaimed permissions is proposed which will give a set of unnecessary permissions for applications under examination. Finally, machine learning aided approaches for analysis of Android malware were adopted. Features including permissions, APIs, content providers, broadcast receivers, and services are extracted from benign (~2,000) and malware (5,560) applications and examined for evaluation. We create feature vector combinations using these features and feed these vectors to various classifiers. Based on the evaluation metrics of classifiers, we scrutinize classifier performance with respect to specific feature combination. Classifiers such as SVM, Logistic Regression and Random Forests spectacle a good performance whilst the dataset of combination of permissions and APIs records the maximum accuracy for Logistic Regression.


Author
Publisher
Release Date
ISBN
Pages 77 pages
Rating 4/5 (33 users)
Read More

More Books:

Android Malware Detection Through Permission and App Component Analysis Using Machine Learning Algorithms
Language: en
Pages: 77
Authors: Keyur Milind Kulkarni
Categories: Android (Electronic resource)
Type: BOOK - Published: 2018 - Publisher:

Improvement in technology has inevitably altered the tactic of criminals to thievery. In recent times, information is the real commodity and it is thus subject
Computer Networks and Inventive Communication Technologies
Language: en
Pages: 1236
Authors: S. Smys
Categories: Technology & Engineering
Type: BOOK - Published: 2021-06-02 - Publisher: Springer Nature

This book is a collection of peer-reviewed best selected research papers presented at 3rd International Conference on Computer Networks and Inventive Communicat
Digital Forensics and Cyber Crime
Language: en
Pages: 235
Authors: Frank Breitinger
Categories: Computers
Type: BOOK - Published: 2018-12-29 - Publisher: Springer

This book constitutes the refereed proceedings of the 10th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2018, held in New Orleans, LA,
Security in Computer and Information Sciences
Language: en
Pages: 159
Authors: Erol Gelenbe
Categories: Computers
Type: BOOK - Published: 2018-07-13 - Publisher: Springer

This open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, held in Londo
Broadband Communications, Networks, and Systems
Language: en
Pages: 201
Authors: Honghao Gao
Categories: Broadband communication systems
Type: BOOK - Published: 2021 - Publisher: Springer Nature

This book constitutes the refereed post-conference proceedings of the 11th International Conference on Broadband Communications, Networks, and Systems, Broadnet
Cyber Security and Digital Forensics
Language: en
Pages: 623
Authors: Kavita Khanna
Categories: Technology & Engineering
Type: BOOK - Published: 2021-10-01 - Publisher: Springer Nature

This book features high-quality research papers presented at the International Conference on Applications and Techniques in Cyber Security and Digital Forensics
Advances in Computing and Data Sciences
Language: en
Pages: 512
Authors: Mayank Singh
Categories: Computers
Type: BOOK - Published: 2019-07-19 - Publisher: Springer

This two-volume set (CCIS 1045 and CCIS 1046) constitutes the refereed proceedings of the Third International Conference on Advances in Computing and Data Scien
Smart Innovations in Communication and Computational Sciences
Language: en
Pages: 332
Authors: Shailesh Tiwari
Categories: Technology & Engineering
Type: BOOK - Published: 2020-08-01 - Publisher: Springer Nature

This book presents the latest advances and research findings in the fields of computational science and communication presented at the International Conference
Machine Intelligence and Soft Computing
Language: en
Pages: 504
Authors: Debnath Bhattacharyya
Categories: Technology & Engineering
Type: BOOK - Published: 2021-01-20 - Publisher: Springer Nature

This book gathers selected papers presented at the International Conference on Machine Intelligence and Soft Computing (ICMISC 2020), held jointly by Vignan’s
ADVANCES IN COMPUTING, INFORMATICS, NETWORKING AND CYBERSECURITY
Language: en
Pages:
Authors: P. Nicopolitidis
Categories: Computer science
Type: BOOK - Published: 2022 - Publisher: Springer Nature

This book presents new research contributions in the above-mentioned fields. Information and communication technologies (ICT) have an integral role in todays so