Analysis of Permission Selection Techniques in Machine Learning-based Malicious App Detection

被引:2
|
作者
Park, Jihyeon [1 ]
Kang, Munyeong [1 ]
Cho, Seong-je [2 ]
Han, Hyoil [3 ]
Suh, Kyoungwon [3 ]
机构
[1] Dankook Univ, Dept Software Sci, Yongin 16890, Gyeonggi Do, South Korea
[2] Dankook Univ, Dept Comp Sci & Engn, Yongin 16890, Gyeonggi Do, South Korea
[3] Illinois State Univ, Sch Informat Technol, Normal, IL 61761 USA
基金
新加坡国家研究基金会;
关键词
Android; malware detection; custom permission; machine learning; Random Forest; MALWARE;
D O I
10.1109/AIKE48582.2020.00021
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the increasing popularity of the Android platform, we have seen the rapid growth of malicious Android applications recently. Considering that the heavy use of applications on mobile phones such as games, emails, and social network services has become a crucial part of our daily life, we have become more vulnerable to malicious applications running on mobile devices. To alleviate this hostile environment of Android mobile applications, we propose a malware detection approach that (1) extracts both built-in permissions and custom permissions requested by Android apps from their Manifest.xml and (2) applies the permissions and a Random Forest classifier to Android applications for classifying them into benign and malicious. The Random Forest classifier learns a model using the permissions to classify the input dataset of 45,311 Android applications. In the learned model, an optimal subset of permissions has been identified and then using the subset of permissions we could achieve 94.23% accuracy in detecting malware.
引用
收藏
页码:92 / 99
页数:8
相关论文
共 50 条
  • [1] Machine Learning-Based Malicious Application Detection of Android
    Wei, Linfeng
    Luo, Weiqi
    Weng, Jian
    Zhong, Yanjun
    zhang, Xiaoqian
    Yan, Zheng
    [J]. IEEE ACCESS, 2017, 5 : 25591 - 25601
  • [2] Reviewing various feature selection techniques in machine learning-based botnet detection
    Baruah, Sangita
    Borah, Dhruba Jyoti
    Deka, Vaskar
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (12):
  • [3] Machine Learning-Based Detection and Categorization of Malicious Accounts on Social Media
    Bhattacharyya, Ajay
    Kulkarni, Adita
    [J]. SOCIAL COMPUTING AND SOCIAL MEDIA, PT I, SCSM 2024, 2024, 14703 : 328 - 337
  • [4] Machine Learning-Based Malicious X.509 Certificates' Detection
    Li, Jiaxin
    Zhang, Zhaoxin
    Guo, Changyong
    [J]. APPLIED SCIENCES-BASEL, 2021, 11 (05): : 1 - 24
  • [5] Machine Learning-Based Anomaly Detection Techniques in Ophthalmology
    Lu, Randy Y.
    Bagdasarova, Yelena
    Lee, Aaron Y.
    [J]. JAMA OPHTHALMOLOGY, 2022, 140 (02) : 189 - 190
  • [6] A Comprehensive Study on Efficient and Accurate Machine Learning-Based Malicious PE Detection
    Barut, Onur
    Zhang, Tong
    Luo, Yan
    Li, Peilong
    [J]. 2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [7] An Intelligent Detection of Malicious Intrusions in IoT Based on Machine Learning and Deep Learning Techniques
    Iftikhar, Saman
    Khan, Danish
    Al-Madani, Daniah
    Alheeti, Khattab M. Ali
    Fatima, Kiran
    [J]. COMPUTER SCIENCE JOURNAL OF MOLDOVA, 2022, 30 (03) : 288 - 307
  • [8] Lexical features based malicious URL detection using machine learning techniques
    Saleem Raja, A.
    Vinodini, R.
    Kavitha, A.
    [J]. MATERIALS TODAY-PROCEEDINGS, 2021, 47 : 163 - 166
  • [9] Review of Machine Learning-Based Intrusion Detection Techniques for MANETs
    Hamza, Fouziah
    Vigila, S. Maria Celestin
    [J]. COMPUTING AND NETWORK SUSTAINABILITY, 2019, 75
  • [10] A Survey of Machine Learning-based loT Intrusion Detection Techniques
    Long, Jing
    Fang, Fei
    Luo, Haibo
    [J]. 2021 IEEE 6TH INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD 2021), 2021, : 7 - 12