Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3199478.3199492acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccspConference Proceedingsconference-collections
research-article

A Novel Android Malware Detection Approach Based on Convolutional Neural Network

Published: 16 March 2018 Publication History

Abstract

With the explosive growth of Android malware, there is a pressure for us to improve the performance of existing malware detection approaches. In this paper, we proposed DeepClassifyDroid, a novel android malware detection system based on deep learning. DeepClassifyDroid takes a three-step approach: feature extraction, feature embedding and deep learning based detection. The first and second steps perform a broad static analysis and generate five different feature sets. The last step performs malware detection based on convolutional neural networks. We evaluated our approach with different feature sets and compared with a variety of machine learning based approaches. Study shows that DeepClassifyDroid outperforms most existing machine learning based approaches and detects 97.4% of the malware with few false alarms. Moreover, our approach is 10 times faster than Linear-SVM and 80 times faster than kNN.

References

[1]
Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., & Klein, J., et al. 2014. Flowdroid:precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. Acm Sigplan Notices, 49(6), 259--269.
[2]
Enck, W., Ongtang, M., & Mcdaniel, P. 2009. On lightweight mobile phone application certification. ACM Conference on Computer and Communications Security (pp.235--245). ACM.
[3]
Aafer, Y., Du, W., & Yin, H. 2013. DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android. International Conference on Security and Privacy in Communication Systems (Vol.127, pp.86--103). Springer International Publishing.
[4]
Grace, M., Zou, S., Zou, S., Zou, S., & Jiang, X. 2012. RiskRanker: scalable and accurate zero-day android malware detection. International Conference on Mobile Systems, Applications, and Services (pp.281--294). ACM.
[5]
Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B. G., & Cox, L. P., et al. 2014. Taintdroid:an information-flow tracking system for realtime privacy monitoring on smartphones. Acm Transactions on Computer Systems, 32(2), 1--29.
[6]
Yan, L. K., & Yin, H. 2013. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis. Proceedings of the 21st USENIX conference on Security symposium (pp.29--29). USENIX Association.
[7]
BläSing, T., Batyuk, L., Schmidt, A. D., & Camtepe, S. A. 2010. An Android Application Sandbox system for suspicious software detection. International Conference on Malicious and Unwanted Software (Vol.33, pp.55--62). IEEE.
[8]
CuckooDroid. Idan Revivo, Ofer Caspi. https://github.com/idanr1986/cuckoo-droid. Accessed October 2017.
[9]
Mobile-Security-Framework. Ajin Abraham, Dominik Schlecht, Matan Dobrushin. https://github.com/MobSF/Mobile-Security-Framework-MobSF. Accessed October 2017.
[10]
Arp, D., Spreitzenbarth, M., Hübner, M., Gascon, H., & Rieck, K. 2014. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket. Network and Distributed System Security Symposium.
[11]
Yerima, S. Y., Sezer, S., & Mcwilliams, G. 2014. Analysis of bayesian classification-based approaches for android malware detection. Information Security Iet, 8(1), 25--36.
[12]
ApkTool. Ryszard Wiśniewski, Connor Tumbleson. https://ibotpeaches.github.io/Apktool/. Accessed October 2017.
[13]
Androguard. Anthony Desnos, Geoffroy Gueguen. https://github.com/androguard/androguard. Accessed October 2017.
[14]
DroidBox. Patrik Lantz. https://github.com/pjlantz/droidbox. Accessed October 2017.
[15]
Monkey. Google. https://developer.android.com/studio/test/monkey.html. Accessed October 2017.
[16]
Wang, Z., Cai, J., Cheng, S., & Li, W. 2017. DroidDeepLearner: Identifying Android malware using deep learning. Sarnoff Symposium, 2016 IEEE (pp.160--165). IEEE.
[17]
Hou, S., Saas, A., Chen, L., & Ye, Y. 2017. Deep4MalDroid: A Deep Learning Framework for Android Malware Detection Based on Linux Kernel System Call Graphs. Ieee/wic/acm International Conference on Web Intelligence Workshops (pp.104--111). IEEE.
[18]
Lu, Y., Lu, Y., Wang, Z., & Xue, Y. 2014. Droid-Sec: deep learning in android malware detection. ACM Conference on SIGCOMM (Vol.44, pp.371--372). ACM.
[19]
Mclaughlin, N., Rincon, J. M. D., Kang, B. J., Yerima, S., Miller, P., & Sezer, S., et al. 2017. Deep Android Malware Detection. ACM on Conference on Data and Application Security and Privacy (pp.301--308). ACM.
[20]
Android Official Permissions. https://developer.android.com/reference/android/Manifest.permission.html. Accessed October 2017.
[21]
Baksmali. JesusFreke. https://github.com/JesusFreke/smali. Accessed October 2017.
[22]
VirusTotal. https://www.virustotal.com/. Accessed October 2017.
[23]
Hegedus, J., Miche, Y., Ilin, A., & Lendasse, A. 2011. Methodology for Behavioral-based Malware Analysis and Detection Using Random Projections and K-Nearest Neighbors Classifiers. International Conference on Computational Intelligence & Security (Vol.9, pp.1016--1023). IEEE.

Cited By

View all
  • (2024)Machine Learning Based Approaches For Android Malware Detection using Hybrid Feature Analysis2024 6th International Conference on Computing and Informatics (ICCI)10.1109/ICCI61671.2024.10485163(158-165)Online publication date: 6-Mar-2024
  • (2024)DeepImageDroid: A Hybrid Framework Leveraging Visual Transformers and Convolutional Neural Networks for Robust Android Malware DetectionIEEE Access10.1109/ACCESS.2024.348559312(156285-156306)Online publication date: 2024
  • (2024)Improved capsule networks based on Nash equilibrium for malicious code classificationComputers and Security10.1016/j.cose.2023.103503136:COnline publication date: 1-Feb-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICCSP 2018: Proceedings of the 2nd International Conference on Cryptography, Security and Privacy
March 2018
187 pages
ISBN:9781450363617
DOI:10.1145/3199478
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • Wuhan Univ.: Wuhan University, China
  • University of Electronic Science and Technology of China: University of Electronic Science and Technology of China

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 16 March 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Android
  2. Deep Learning
  3. Feature Selection
  4. Malware Detection

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICCSP 2018

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)28
  • Downloads (Last 6 weeks)2
Reflects downloads up to 13 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Machine Learning Based Approaches For Android Malware Detection using Hybrid Feature Analysis2024 6th International Conference on Computing and Informatics (ICCI)10.1109/ICCI61671.2024.10485163(158-165)Online publication date: 6-Mar-2024
  • (2024)DeepImageDroid: A Hybrid Framework Leveraging Visual Transformers and Convolutional Neural Networks for Robust Android Malware DetectionIEEE Access10.1109/ACCESS.2024.348559312(156285-156306)Online publication date: 2024
  • (2024)Improved capsule networks based on Nash equilibrium for malicious code classificationComputers and Security10.1016/j.cose.2023.103503136:COnline publication date: 1-Feb-2024
  • (2024)An Overview of Techniques for Obfuscated Android Malware DetectionSN Computer Science10.1007/s42979-024-02637-35:4Online publication date: 16-Mar-2024
  • (2024)An Inclusive Analysis on Deep Learning Hinged Malware Detection TechniquesArtificial Intelligence and Speech Technology10.1007/978-3-031-75167-7_33(417-425)Online publication date: 24-Nov-2024
  • (2024)A Deep Learning Method for Obfuscated Android Malware DetectionMachine Learning, Image Processing, Network Security and Data Sciences10.1007/978-3-031-62217-5_13(149-164)Online publication date: 11-Jun-2024
  • (2024)ReferencesMobile Edge Computing and Communications10.1002/9781119611646.refs(209-243)Online publication date: 27-Dec-2024
  • (2023)Android Malware Detection Approach Using Stacked AutoEncoder and Convolutional Neural NetworksInternational Journal of Intelligent Information Technologies10.4018/IJIIT.32995619:1(1-22)Online publication date: 19-Sep-2023
  • (2023)A Proposed Artificial Intelligence Model for Android-Malware DetectionInformatics10.3390/informatics1003006710:3(67)Online publication date: 18-Aug-2023
  • (2023)A Malware Detection and Extraction Method for the Related Information Using the ViT Attention Mechanism on Android Operating SystemApplied Sciences10.3390/app1311683913:11(6839)Online publication date: 5-Jun-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media