Intelligent Android Malware Detection Using Radial Basis Function Networks and Permission Features

被引:0
|
作者
Abdulrahman, Ammar [1 ]
Hashem, Khalid [1 ]
Adnan, Gaze [1 ]
Ali, Waleed [1 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Informat Technol Dept, Rabigh, Saudi Arabia
关键词
Android applications; Android malware detection; Radial basis function network; Feature selection; GENETIC ALGORITHM; ENSEMBLE; RISK;
D O I
10.22937/IJCSNS.2021.21.6.37
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, the quick development rate of apps in the Android platform has led to an accelerated increment in creating malware applications by cyber attackers. Numerous Android malware detection tools have utilized conventional signature-based approaches to detect malware apps. However, these conventional strategies can't identify the latest apps on whether applications are malware or not. Many new malware apps are periodically discovered but not all malware Apps can be accurately detected. Hence, there is a need to propose intelligent approaches that are able to detect the newly developed Android malware applications. In this study, Radial Basis Function (RBF) networks are trained using known Android applications and then used to detect the latest and new Android malware applications. Initially, the optimal permission features of Android apps are selected using Information Gain Ratio (IGR). Appropriately, the features selected by IGR are utilized to train the RBF networks in order to detect effectively the new Android malware apps. The empirical results showed that RBF achieved the best detection accuracy (97.20%) among other common machine learning techniques. Furthermore, RBF accomplished the best detection results in most of the other measures.
引用
收藏
页码:286 / 293
页数:8
相关论文
共 50 条
  • [1] Merging Permission and API Features for Android Malware Detection
    Qiao, Mengyu
    Sung, Andrew H.
    Liu, Qingzhong
    [J]. PROCEEDINGS 2016 5TH IIAI INTERNATIONAL CONGRESS ON ADVANCED APPLIED INFORMATICS IIAI-AAI 2016, 2016, : 566 - 571
  • [2] Android Malware Detection Using Permission Analysis
    Shahriar, Hossain
    Islam, Mahbubul
    Clincy, Victor
    [J]. SOUTHEASTCON 2017, 2017,
  • [3] PermPair: Android Malware Detection Using Permission Pairs
    Arora, Anshul
    Peddoju, Sateesh K.
    Conti, Mauro
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 1968 - 1982
  • [4] Hybrid Detection Using Permission Analysis for Android Malware
    Jiao, Haofeng
    Li, Xiaohong
    Zhang, Lei
    Xu, Guangquan
    Feng, Zhiyong
    [J]. INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 541 - 545
  • [5] Permission Weighting Approaches in Permission Based Android Malware Detection
    Kural, Oguz Emre
    Sahin, Durmus Ozkan
    Akleylek, Sedat
    Kilic, Erdal
    [J]. 2019 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2019, : 134 - 139
  • [6] Permission based detection system for android malware
    Utku, Anil
    Dogru, Ibrahim Alper
    [J]. JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY, 2017, 32 (04): : 1015 - 1024
  • [7] Permission based malware detection in android devices
    Ilham, Soussi
    Abderrahim, Ghadi
    Abdelhakim, Boudhir Anouar
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON SMART CITY APPLICATIONS (SCA'18), 2018,
  • [8] The Evolution of Permission as Feature for Android Malware Detection
    Gaviria de la Puerta, Jose
    Sanz, Borja
    Santos Grueiro, Igor
    Garcia Bringas, Pablo
    [J]. INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15, 2015, 369 : 389 - 400
  • [9] Android Malware Detection with Contrasting Permission Patterns
    Xiong Ping
    Wang Xiaofeng
    Niu Wenjia
    Zhu Tianqing
    Li Gang
    [J]. CHINA COMMUNICATIONS, 2014, 11 (08) : 1 - 14
  • [10] Permission Extraction Framework for Android Malware Detection
    Ghasempour, Ali
    Sani, Nor Fazlida Mohd
    Abari, Ovye John
    [J]. International Journal of Advanced Computer Science and Applications, 2020, 11 (11): : 463 - 475