Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3287921.3287977acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoictConference Proceedingsconference-collections
research-article

NADM: Neural Network for Android Detection Malware

Published: 06 December 2018 Publication History

Abstract

Over recent years, Android is always captured roughly 80% of the worldwide smartphone volume. Due to its popularity and open characteristic, the Android OS is becoming the system platform most targeted from mobile malware. They can cause a lot of damage on Android devices such as data loss or sabotage of hardware. According to the predictive characteristics, machine learning is a good approach to deal with the number of new malwares increasing rapidly. In this paper, we propose Neural Network for Android Detection of Malware (NADM). The NADM performs an analysis process to gather features of Android applications. Then, these data will be converted into joint vector spaces, which to be input for the training part of deep learning process. Our classifier model can achieve a high accuracy system and has been applied in sProtect [15] on Google Play.

References

[1]
2010-2018. Android Asset Packaging Tool. https://elinux.org/Android_aapt
[2]
Daniel Arp, Michael Spreitzenbarth, Malte Huebner, Hugo Gascon, and Konrad Rieck. 2014. Drebin: Efficient and Explainable Detection of Android Malware in Your Pocket. 21th Annual Network and Distributed System Security Symposium (NDSS) (2014).
[3]
Y. Bengio, P. Simard, and P. Frasconi. 1994. Learning long-term dependencies with gradient descent is difficult. IEEE Transactions on Neural Networks 5, 2 (1994), 157--166.
[4]
Ronan Collobert and Samy Bengio. 2004. Links Between Perceptrons, MLPs and SVMs. In Proceedings of the Twenty-first International Conference on Machine Learning (ICML '04).ACM, New York, NY, USA, 23--.
[5]
William Enck, Machigar Ongtang, and Patrick McDaniel. 2009. On Lightweight Mobile Phone Application Certification. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09). ACM, New York, NY, USA, 235--245.
[6]
FRosenblatt. 1957. The perceptron, a perceiving and recognizing automaton Project Para.
[7]
Dragos Gavrilut, Mihai Cimpoesu, D Anton, and Liviu Ciortuz. 2009. Malware detection using machine learning. 4 (11 2009), 735--741.
[8]
Scott Adam Gordon. 2017. Google's security suite "Play Protect" rolling out to Android phones. http://www.androidauthority.com/google-play-protect-rolling-out-788614/
[9]
M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang. 2012. Proc. of International Conference on Mobile Systems, Applications, and Services (MOBISYS). In Proc. of International Conference on Mobile Systems, Applications, and Services (MOBISYS). 281--2494.
[10]
K. Hornik, M. Stinchcombe, and H. White. 1989. Multilayer Feedforward Networks Are Universal Approximators. Neural Netw. 2, 5 (July 1989), 359--366.
[11]
Matthew Leeds, Miclain Keffeler, and Travis Atkison. 2017. A Comparison of Features for Android Malware Detection. In Proceedings of the South East Conference (ACM SE '17).ACM, New York, NY, USA, 63--68.
[12]
Niall McLaughlin, Jesus Martinez del Rincon, BooJoong Kang, Suleiman Yerima, Paul Miller, Sakir Sezer, Yeganeh Safaei, Erik Trickel, Ziming Zhao, Adam Doupé, and Gail Joon Ahn. 2017. Deep Android Malware Detection. In Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy (CODASPY '17). ACM, New York, NY, USA, 301--308.
[13]
Trend Micro. 2017. 2017 Mobile Threat Landscape. https://www.trendmicro.com/vinfo/us/security/research-and-analysis/threat-reports/roundup/2017-mobile-threat-landscape
[14]
Savan Patel. 2017. Chapter 2: SVM(Support Vector Machine) - Theory. https://medium.com/machine-learning-101/chapter-2-svm-support-vector-machine-theory-f0812effc72
[15]
sTel Group. 2017. sProtect Antivirus & Evaluate Security. https://play.google.com/store/apps/details?id=org.stel.sProtect
[16]
Mervyn Stone. 1974. Cross-validatory choice and assessment of statistical predictions. Journal of the royal statistical society. Series B (Methodological) (1974), 111--147.
[17]
Sai Deep Tetali. 2018. Keeping 2 billion Android devices safe with machine learning. https://android-developers.googleblog.com/2018/05/keeping-2-billion-android-devices-safe.html
[18]
Thorsten Joachims <[email protected]>. {n. d.}. SVM light format. https://blog.argcv.com/articles/5371.c
[19]
Long Wen and Haiyang Yu. 2017. An Android malware detection system based on machine learning. In AIP Conference Proceedings, Vol. 1864. 020136.
[20]
Peter Gilbert William Enck and Byung-Gon Chun. 2010. Taint-Droid: An Information-Flow Tracking System for Real-time PrivacyMonitoring on Smartphones. In 9th USENIX Symposium on Operating Systems Design and Implementation.
[21]
Lifan Xu, Dongping Zhang, Nuwan Jayasena, and John Cavazos. 2018. HADM: Hybrid Analysis for Detection of Malware. 702--724.
[22]
Zhenlong Yuan, Yongqiang Lu, Zhaoguo Wang, and Yibo Xue. 2014. Droid-Sec: Deep Learning in Android Malware Detection. SIGCOMM Comput. Commun. Rev. 44, 4 (Aug. 2014), 371--372.
[23]
M. Zheng, M. Sun, and J. C. S. Lui. 2013. Droid Analytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware. In 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. 163--171.

Cited By

View all
  • (2022)Android X-Ray - A system for Malware Detection in Android apps using Dynamic AnalysisWSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS10.37394/23209.2022.19.2719(264-271)Online publication date: 7-Nov-2022
  • (2022)CFSBFDroidMobile Information Systems10.1155/2022/64255832022Online publication date: 1-Jan-2022
  • (2021)Learning-Based Detection for Malicious Android Application Using Code VectorizationSecurity and Communication Networks10.1155/2021/99642242021Online publication date: 1-Jan-2021
  • Show More Cited By

Index Terms

  1. NADM: Neural Network for Android Detection Malware

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    SoICT '18: Proceedings of the 9th International Symposium on Information and Communication Technology
    December 2018
    496 pages
    ISBN:9781450365390
    DOI:10.1145/3287921
    © 2018 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

    In-Cooperation

    • SOICT: School of Information and Communication Technology - HUST
    • NAFOSTED: The National Foundation for Science and Technology Development

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 06 December 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Android malware detection
    2. Neural network model
    3. Static analysis

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    SoICT 2018

    Acceptance Rates

    Overall Acceptance Rate 147 of 318 submissions, 46%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 25 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Android X-Ray - A system for Malware Detection in Android apps using Dynamic AnalysisWSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS10.37394/23209.2022.19.2719(264-271)Online publication date: 7-Nov-2022
    • (2022)CFSBFDroidMobile Information Systems10.1155/2022/64255832022Online publication date: 1-Jan-2022
    • (2021)Learning-Based Detection for Malicious Android Application Using Code VectorizationSecurity and Communication Networks10.1155/2021/99642242021Online publication date: 1-Jan-2021
    • (2021)Research on unsupervised feature learning for Android malware detection based on Restricted Boltzmann MachinesFuture Generation Computer Systems10.1016/j.future.2021.02.015120(91-108)Online publication date: Jul-2021
    • (2020)A Review of Hybrid Malware Detection Techniques in Android2020 IEEE 23rd International Multitopic Conference (INMIC)10.1109/INMIC50486.2020.9318117(1-6)Online publication date: 5-Nov-2020
    • (2019)Constructing Features for Detecting Android Malicious Applications: Issues, Taxonomy and DirectionsIEEE Access10.1109/ACCESS.2019.29181397(67602-67631)Online publication date: 2019

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media