A machine learning technique for Android malicious attacks detection based on API calls

被引:1
|
作者
AL-Akhrasa, Mousa [1 ]
Alghamdib, Saud [2 ]
Omarc, Hani [3 ]
Alshareefb, Hazzaa [2 ]
机构
[1] Univ Jordan, King Abdullah II Sch Informat Technol, Amman 11942, Jordan
[2] Saudi Elect Univ, Coll Comp & Informat, Riyadh 11673, Saudi Arabia
[3] Zarqa Univ, Fac Informat Technol, Zarqa 13110, Jordan
关键词
Attack Detection; API Calls; Machine Learning; Malware; Android;
D O I
10.5267/dsl.2023.12.004
中图分类号
C93 [管理学]; O22 [运筹学];
学科分类号
070105 ; 12 ; 1201 ; 1202 ; 120202 ;
摘要
Android malware is widespread and it is considered as one of the most threatening attacks recently. The threat is targeting to damage access data or information or leaking them; in general, malicious software consists of viruses, worms, and other malware. Current malware attempts to prevent being detected by any software or anti-virus. This paper describes recent Android malware detection static and interactive approaches as well as several open-source malware datasets. The paper also examines the most current state-of-the-art Android malware identification techniques including identifying by comparative evaluation the gaps between these techniques. As a result, an API-based dynamic malware detection framework is proposed for Android to provide a dynamic paradigm for malware detection. The proposed framework was closely inspected and checked for reliability where meaningful API packages and methods were discovered. (c) 2024 by the authors; licensee Growing Science, Canada.
引用
收藏
页码:29 / 44
页数:16
相关论文
共 50 条
  • [21] Android Malicious Application Detection Based on Ontology Technology Integrated with Permissions and System Calls
    Chen, Da
    Zhang, Hongmei
    Zhang, Xiangli
    Wang, Demin
    [J]. 2016 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI), 2016, : 481 - 484
  • [22] STATIC DETECTION OF ANDROID MALWARE BY USING PERMISSIONS AND API CALLS
    Chan, Patrick P. K.
    Song, Wen-Kai
    [J]. PROCEEDINGS OF 2014 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC), VOL 1, 2014, : 82 - 87
  • [23] Evaluating the Possibility of Evasion Attacks to Machine Learning-Based Models for Malicious PowerShell Detection
    Mezawa, Yuki
    Mimura, Mamoru
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2022, 2022, 13620 : 252 - 267
  • [24] Android Malicious Application Detection Using Support Vector Machine and Active Learning
    Rashidi, Bahman
    Fung, Carol
    Bertino, Elisa
    [J]. 2017 13TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2017,
  • [25] Experimental analysis of Android malware detection based on combinations of permissions and API-calls
    Singh, Abhishek Kumar
    Jaidhar, C. D.
    Kumara, M. A. Ajay
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2019, 15 (03) : 209 - 218
  • [26] Dynamic detection on android malicious codes using API call sequences
    Shi, Dong-Xian
    Xu, Zhi-Wei
    Jiang, Jie
    Zhang, Hui
    Pan, Yong-Tao
    [J]. Boletin Tecnico/Technical Bulletin, 2017, 55 (12): : 436 - 446
  • [27] Experimental analysis of Android malware detection based on combinations of permissions and API-calls
    Abhishek Kumar Singh
    C. D. Jaidhar
    M. A. Ajay Kumara
    [J]. Journal of Computer Virology and Hacking Techniques, 2019, 15 : 209 - 218
  • [28] Machine Learning Techniques for Classifying Malicious API Calls and N-Grams in Kaggle Data-set
    Hu, Yen-Hung
    Ali, Abdinur
    Hsieh, Chung-Chu
    Williams, Aurelia
    [J]. 2019 IEEE SOUTHEASTCON, 2019,
  • [29] Android Malware Detection Based on Machine Learning
    Wang, Qing-Fei
    Fang, Xiang
    [J]. 2018 4TH ANNUAL INTERNATIONAL CONFERENCE ON NETWORK AND INFORMATION SYSTEMS FOR COMPUTERS (ICNISC 2018), 2018, : 434 - 436
  • [30] Time and Computation Efficient Malicious Android Application Detection Using Machine Learning Techniques
    Saqlain, Sabbir Ahmed
    Bin Mahamud, Navid
    Paul, Mahit Kumar
    Sattar, A. H. M. Sarowar
    [J]. 2019 5TH INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL ENGINEERING (ICAEE), 2019, : 536 - 540