Skip to main content

Evaluating Machine Learning Models on the Ethereum Blockchain for Android Malware Detection

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 998))

Abstract

Android, the most popular mobile operating system, with billions of active users and more than 2 million apps, has motivated advertisers, hackers, fraudsters and cyber-criminals to develop malware of all types for it. In recent years, extensive research has been conducted on malware analysis and detection for Android devices, even though Android has already implemented various security mechanisms to deal with the problem. In this paper, we developed a consortium blockchain network to evaluate various machine learning models for a given malware dataset. A reward is offered using smart contracts as an incentive to the competitors for their work by allowing them to submit solutions through training with selected machine learning models in a secure and trustworthy manner. The analysis of datasets by competitors helps various organizations in the network to enhance or boost their current malware detection or defense tools. The decentralized network provides transparency, enhances security and reduces the cost in managing all relevant data by eliminating third parties. We used DREBIN dataset in the developed framework for initial experiments and the encouraging results are presented.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Drake, J.J., Lanier, Z., Mulliner, C., Fora, P.O., Ridley, S.A., Wicherski, G.: Android Hacker’s Handbook. Wiley, Indianapolis (2014)

    Google Scholar 

  2. Rana, M.S., Sung, A.H.: Malware analysis on android using supervised machine learning techniques. Int. J. Comput. Commun. Eng. 7(4), 178–188 (2018)

    Article  Google Scholar 

  3. Rana, M.S., Rahman, S.S.M.M., Sung, A.H.: Evaluation of tree based machine learning classifiers for android malware detection. In: Nguyen, N., Pimenidis, E., Khan, Z., Trawiński, B. (eds.) Computational Collective Intelligence. ICCCI 2018. Lecture Notes in Computer Science, vol. 11056. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-98446-9_35

    Chapter  Google Scholar 

  4. Rana, M.S., Gudla, C., Sung, A.H.: Android malware detection using stacked generalization. In: Proceeding of 27th International Conference on Software Engineering and Data Engineering, pp. 15–19 (2018)

    Google Scholar 

  5. Rana, M.S., Gudla, C., Sung, A.H.: Evaluating machine learning models for android malware detection – a comparison study. In: Proceeding of International Conference on Network, Communication, and Computing, Taipei, Taiwan (2018)

    Google Scholar 

  6. Enck, W., Gilbert, P., Chun, B., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.: Taintdroid: an information-flow tracking system for real-time privacy monitoring on smartphones. In: Proceeding of USENIX Symposium on Operating Systems Design and Implementation (OSDI), pp. 393–407 (2010)

    Google Scholar 

  7. Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, you, get off my market: detecting malicious apps in official and alternative android markets. In: Proceeding of Network and Distributed System Security Symposium (NDSS) (2012)

    Google Scholar 

  8. Yan, L.K., Yin, H.: Droidscope: seamlessly reconstructing OS and dalvik semantic views for dynamic android malware analysis. In: Proceeding of USENIX Security Symposium (2012)

    Google Scholar 

  9. Enck, W., Ongtang, M., McDaniel, P.D.: On lightweight mobile phone application certification. In: Proceeding of ACM Conference on Computer and Communications Security (CCS), pp. 235–245 (2009)

    Google Scholar 

  10. Felt, A.P., Chin, E., Hanna, S., Song, D., and Wagner, D.: Android permissions demystified. In: Proceeding of ACM Conference on Computer and Communications Security (CCS), pp. 627–638 (2011)

    Google Scholar 

  11. Grace, M., Zhou, Y., Zhang, Q., Zou, S., Jiang, X.: Risk-ranker: scalable and accurate zero-day android malware detection. In: Proceeding of International Conference on Mobile Systems, Applications, and Services (MOBISYS), pp. 281–294 (2012)

    Google Scholar 

  12. Kurtulmus, A.B., Daniel, K.: Trustless Machine Learning Contracts; Evaluating and Exchanging Machine Learning Models on the Ethereum Blockchain, Algorithmia Research (2018). https://algorithmia.com/static/documents/d3a4c04/Machine-Learning-Models-on-the-Ethereum-Blockchain.pdf. Accessed 18 Sept 2018

  13. Gu, J., Sun, B., Du, X., Wang, J., Zhuang, Y., Wang, Z.: Consortium blockchain-based malware detection in mobile devices. In: IEEE Access, vol. 6, pp. 12118–12128 (2018). https://doi.org/10.1109/access.2018.2805783

    Article  Google Scholar 

  14. Raje, S., Vaderia, S., Wilson, N., Panigrahi, R.: Decentralised firewall for malware detection. In: 2017 International Conference on Advances in Computing, Communication and Control (ICAC3), pp. 1–5 (2017)

    Google Scholar 

  15. Ouaguid, A., Abghour, N., Ouzzif, M.: A novel security framework for managing android permissions using blockchain technology. Int. J. Cloud Appl. Comput. (IJCAC) 8(1), 55–79 (2018)

    Google Scholar 

  16. Noyes, C.: BitAV: Fast Anti-Malware by Distributed Blockchain Consensus and Feedforward Scanning, CoRR, abs/1601.01405 (2016)

    Google Scholar 

  17. Firdaus, A., Anuar, N.B., Razak, M.F., Hashem, I.A., Bachok, S., Sangaiah, A.K.: Root exploit detection and features optimization: mobile device and blockchain based medical data management. J. Med. Syst. 42, 1–23 (2018)

    Article  Google Scholar 

  18. Moubarak, J., Filiol, E., Chamoun, M.: Developing a K-ary malware using Blockchain. https://arxiv.org/abs/1804.01488. Accessed 20 Oct 2018

  19. Decision Tree – Classification. https://www.saedsayad.com/decision_tree.htm. Accessed 20 Oct 2018

  20. Towards Data Science | The Random Forest Algorithm. https://towards-datascience.com/the-random-forest-algorithm-d457d499ffcd. Accessed 20 Oct 2018

  21. Geurts, P., Ernst, D., Wehenkel, L.: Extremely randomized trees. Mach. Learn. 63(1), 3–42 (2006)

    Article  Google Scholar 

  22. A Comprehensive Guide to Ensemble Learning. https://www.analyticsvidhya.com/-blog/2018/06/comprehensive-guide-for-ensemble-models/. Accessed 20 Oct 2018

  23. Towards Data Science | Support Vector Machine - Introduction to Machine Learning Algorithms. https://towardsdatascience.com/support-vector-machine-introduction-to-machine-learning-algorithms-934a444fca47. Accessed 20 Oct 2018

  24. Neural Networks with Scikit. https://www.python-course.eu/neural-networks-with-scikit.php. Accessed 20 Oct 2018

  25. Naive Bayes for Machine Learning. https://machinelearningmastery.com/naive-bayes-for-machine-learning/. Accessed 20 Oct 2018

  26. K-Nearest Neighbors for Machine Learning. https://machinelearningmastery.com/k-nearest-neighbors-for-machine-learning/. Accessed 20 Oct 2018

  27. Discriminant Analysis. https://ncss-wpengine.netdna-ssl.com/wp-content/themes/nc-ss/pdf/Procedures/NCSS/Discriminant_Analysis.pdf. Accessed 20 Oct 2018

  28. Towards Data Science | Logistic Regression - Detailed Overview. https://towards-datascience.com/logistic-regression-detailed-overview-46c4da4303bc. Accessed 20 Oct 2018

  29. Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K.: DREBIN: effective and explainable detection of android malware in your pocket. In: NDSS, vol. 14, pp. 23–26, USA (2014)

    Google Scholar 

  30. Confusion Matrix. http://www2.cs.uregina.ca/~dbd/cs831/notes/confusion-matrix/confusion-matrix.html. Accessed 20 Oct 2018

  31. Simple guide to confusion matrix terminology. http://www.dataschool.io/simple-guide-to-confusion-matrix-terminology/. Accessed 20 Oct 2018

Download references

Acknowledgment

The authors wish to acknowledge the valuable help received from Besir Kurtulmus, Algorithmia Inc., for his guidance on technology and domain knowledge pertaining to applying machine learning within blockchain.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Md. Shohel Rana .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rana, M.S., Gudla, C., Sung, A.H. (2019). Evaluating Machine Learning Models on the Ethereum Blockchain for Android Malware Detection. In: Arai, K., Bhatia, R., Kapoor, S. (eds) Intelligent Computing. CompCom 2019. Advances in Intelligent Systems and Computing, vol 998. Springer, Cham. https://doi.org/10.1007/978-3-030-22868-2_34

Download citation

Publish with us

Policies and ethics