Evaluation of machine learning classifiers for mobile malware detection

被引:1
|
作者
Fairuz Amalina Narudin
Ali Feizollah
Nor Badrul Anuar
Abdullah Gani
机构
[1] University of Malaya,Mobile Cloud Computing (MCC)
[2] University of Malaya,Security Research Group (SECReg), Faculty of Computer Science and Information Technology
来源
Soft Computing | 2016年 / 20卷
关键词
Intrusion detection system; Machine learning; Android malware detection; Anomaly based; Mobile device;
D O I
暂无
中图分类号
学科分类号
摘要
Mobile devices have become a significant part of people’s lives, leading to an increasing number of users involved with such technology. The rising number of users invites hackers to generate malicious applications. Besides, the security of sensitive data available on mobile devices is taken lightly. Relying on currently developed approaches is not sufficient, given that intelligent malware keeps modifying rapidly and as a result becomes more difficult to detect. In this paper, we propose an alternative solution to evaluating malware detection using the anomaly-based approach with machine learning classifiers. Among the various network traffic features, the four categories selected are basic information, content based, time based and connection based. The evaluation utilizes two datasets: public (i.e. MalGenome) and private (i.e. self-collected). Based on the evaluation results, both the Bayes network and random forest classifiers produced more accurate readings, with a 99.97 % true-positive rate (TPR) as opposed to the multi-layer perceptron with only 93.03 % on the MalGenome dataset. However, this experiment revealed that the k-nearest neighbor classifier efficiently detected the latest Android malware with an 84.57 % true-positive rate higher than other classifiers.
引用
收藏
页码:343 / 357
页数:14
相关论文
共 50 条
  • [41] The Curious Case of Machine Learning in Malware Detection
    Saad, Sherif
    Briguglio, William
    Elmiligi, Haytham
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 528 - 535
  • [42] An Android Malware Detection Leveraging Machine Learning
    Shatnawi, Ahmed S.
    Jaradat, Aya
    Yaseen, Tuqa Bani
    Taqieddin, Eyad
    Al-Ayyoub, Mahmoud
    Mustafa, Dheya
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [43] Analysis of machine learning models for malware detection
    Rahul
    Kedia, Priyansh
    Sarangi, Subrat
    Monika
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2020, 23 (02): : 395 - 407
  • [44] Android Malware Detection Based on Machine Learning
    Wang, Qing-Fei
    Fang, Xiang
    [J]. 2018 4TH ANNUAL INTERNATIONAL CONFERENCE ON NETWORK AND INFORMATION SYSTEMS FOR COMPUTERS (ICNISC 2018), 2018, : 434 - 436
  • [45] Comparing Machine Learning Techniques for Malware Detection
    Moubarak, Joanna
    Feghali, Tony
    [J]. ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 844 - 851
  • [46] Building a Machine Learning Classifier for Malware Detection
    Markel, Zane
    Bilzor, Michael
    [J]. 2014 SECOND WORKSHOP ON ANTI-MALWARE TESTING RESEARCH (WATER), 2014, : 20 - 23
  • [47] ANALYSIS OF MACHINE LEARNING METHODS ON MALWARE DETECTION
    Aydogan, Emre
    Sen, Sevil
    [J]. 2014 22ND SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2014, : 2066 - 2069
  • [48] Malware Detection and Classification with Machine Learning Algorithms
    Kumar, R. Vinoth
    Islam, Md Mojahidul
    Apon, Abir Hossain
    Prantha, C. S.
    [J]. SMART TRENDS IN COMPUTING AND COMMUNICATIONS, VOL 5, SMARTCOM 2024, 2024, 949 : 143 - 158
  • [49] Android Malware Detection Using Machine Learning
    Droos, Ayat
    Al-Mahadeen, Awss
    Al-Harasis, Tasnim
    Al-Attar, Rama
    Ababneh, Mohammad
    [J]. 2022 13TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2022, : 36 - 41
  • [50] A Machine Learning Approach for Linux Malware Detection
    Asmitha, K. A.
    Vinod, P.
    [J]. PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT), 2014, : 825 - 830