Analysis of Permission Selection Techniques in Machine Learning-based Malicious App Detection

被引:2
|
作者
Park, Jihyeon [1 ]
Kang, Munyeong [1 ]
Cho, Seong-je [2 ]
Han, Hyoil [3 ]
Suh, Kyoungwon [3 ]
机构
[1] Dankook Univ, Dept Software Sci, Yongin 16890, Gyeonggi Do, South Korea
[2] Dankook Univ, Dept Comp Sci & Engn, Yongin 16890, Gyeonggi Do, South Korea
[3] Illinois State Univ, Sch Informat Technol, Normal, IL 61761 USA
基金
新加坡国家研究基金会;
关键词
Android; malware detection; custom permission; machine learning; Random Forest; MALWARE;
D O I
10.1109/AIKE48582.2020.00021
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the increasing popularity of the Android platform, we have seen the rapid growth of malicious Android applications recently. Considering that the heavy use of applications on mobile phones such as games, emails, and social network services has become a crucial part of our daily life, we have become more vulnerable to malicious applications running on mobile devices. To alleviate this hostile environment of Android mobile applications, we propose a malware detection approach that (1) extracts both built-in permissions and custom permissions requested by Android apps from their Manifest.xml and (2) applies the permissions and a Random Forest classifier to Android applications for classifying them into benign and malicious. The Random Forest classifier learns a model using the permissions to classify the input dataset of 45,311 Android applications. In the learned model, an optimal subset of permissions has been identified and then using the subset of permissions we could achieve 94.23% accuracy in detecting malware.
引用
收藏
页码:92 / 99
页数:8
相关论文
共 50 条
  • [31] Machine learning-based intrusion detection: feature selection versus feature extraction
    Ngo, Vu-Duc
    Vuong, Tuan-Cuong
    Van Luong, Thien
    Tran, Hung
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (03): : 2365 - 2379
  • [32] Machine Learning-Based Cardiovascular Disease Detection Using Optimal Feature Selection
    Ullah, Tahseen
    Ullah, Syed Irfan
    Ullah, Khalil
    Ishaq, Muhammad
    Khan, Ahmad
    Ghadi, Yazeed Yasin
    Algarni, Abdulmohsen
    [J]. IEEE ACCESS, 2024, 12 : 16431 - 16446
  • [33] Feature Selection For Machine Learning-Based Early Detection of Distributed Cyber Attacks
    Feng, Yaokai
    Akiyama, Hitoshi
    Lu, Liang
    Sakurai, Kouichi
    [J]. 2018 16TH IEEE INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP, 16TH IEEE INT CONF ON PERVAS INTELLIGENCE AND COMP, 4TH IEEE INT CONF ON BIG DATA INTELLIGENCE AND COMP, 3RD IEEE CYBER SCI AND TECHNOL CONGRESS (DASC/PICOM/DATACOM/CYBERSCITECH), 2018, : 173 - 180
  • [34] Machine learning and deep learning-based advanced classification techniques for the detection of major depressive disorder
    Chatterjee, Abhinandan
    Bala, Pradip
    Gedam, Shruti
    Paul, Sanchita
    Goyal, Nishant
    [J]. ASLIB JOURNAL OF INFORMATION MANAGEMENT, 2023, 76 (06) : 938 - 973
  • [35] CondiS web app: imputation of censored lifetimes for machine learning-based survival analysis
    Wang, Yizhuo
    Flowers, Christopher R.
    Li, Ziyi
    Huang, Xuelin
    [J]. BIOINFORMATICS, 2022, 38 (17) : 4252 - 4254
  • [36] A MACHINE LEARNING APPROACH TO THE DETECTION AND ANALYSIS OF ANDROID MALICIOUS APPS
    Shibija, K.
    Raymond, Joseph, V
    [J]. 2018 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2018,
  • [37] Malicious Domain Name Detection Based on Extreme Machine Learning
    Yong Shi
    Gong Chen
    Juntao Li
    [J]. Neural Processing Letters, 2018, 48 : 1347 - 1357
  • [38] Malicious Domain Name Detection Based on Extreme Machine Learning
    Shi, Yong
    Chen, Gong
    Li, Juntao
    [J]. NEURAL PROCESSING LETTERS, 2018, 48 (03) : 1347 - 1357
  • [39] Malicious attack detection approach in cloud computing using machine learning techniques
    M. Arunkumar
    K. Ashok Kumar
    [J]. Soft Computing, 2022, 26 : 13097 - 13107
  • [40] Malicious attack detection approach in cloud computing using machine learning techniques
    Arunkumar, M.
    Kumar, K. Ashok
    [J]. SOFT COMPUTING, 2022, 26 (23) : 13097 - 13107