Skip to main content

Towards Neural Network Based Malware Detection on Android Mobile Devices

  • Chapter
  • First Online:

Part of the book series: Advances in Information Security ((ADIS,volume 61))

Abstract

Due to the exponential increase in the use of smart mobile devices, malware threats on those devices have been growing and posing security risks. To address this critical issue, we developed an Artificial Neural Network (ANN)-based malware detection system to detect unknown malware. In our system, we consider both permissions requested by applications and system calls associated with the execution of applications to distinguish between benign applications and malware. We used ANN, a representative machine learning technique, to understand the anomaly behavior of malware by learning the characteristic permissions and system calls used by applications. We then used the trained ANN to detect malware. Using real-world malware and benign applications, we conducted experiments on Android devices and evaluated the effectiveness of our developed system.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. What is Android? http://android.pk/android.html.

    Google Scholar 

  2. Smartphones account for half of all mobile phones, dominate new phone purchases in the us. http://www.nielsen.com/us/en/newswire/2012 / smartphones-account-for-half-of-all-mobile-phones-dominate-new-phone-purchases-inhtml.

  3. A. Nere, A. Hashmi, M. Lipasti, and G. Tononi: Bridging the Semantic Gap: Emulating Biological Neuronal Behaviors with Simple Digital Neurons. In Proceedings of IEEE 19th International Symposium on High Perfor- mance Computer Architecture (HPCA), (2013).

    Google Scholar 

  4. D. J. Montana and L. Davis: Training Feedforward Neural Networks Using Ge- netic. In Proceedings of International Joint Conference on Artificial Intelligence Algorithms, (1989).

    Google Scholar 

  5. X. Yu, M. O. Efe, and O. Kaynak: A General Backpropagation Algorithm for Feedforward Neural Networks Learning. In IEEE Transactions on Neural Net- works, vol. 13, pp. 251-254 (2002).

    Article  Google Scholar 

  6. G. Arulampalam and A. Bouzerdoum: A Generalized Feedforward Neural Network Architecture for Classification and Regression. In Journal of Neural Networks, vol. 16, pp. 561-568 (2003).

    Article  Google Scholar 

  7. J. Y. F. Yam and T. W. S. Chow: A Weight Initialization Method for Improving Training Speed in Feedforward Neural Network. In Neurocomputing, vol. 30, pp. 219-232 (2000).

    Article  Google Scholar 

  8. S. Kak: On Training Feedforward Neural Networks. In Pramana-Journal of Physics, vol. 40, pp. 35-42 (1993).

    Article  Google Scholar 

  9. A. D. Schmidt, R. Bye, H. G. Schmidt, J. H. Clausen, O. Kiraz, K. Yuksel, S. A. Camtepe, and S. Albayrak: Static Analysis of Executables for Collaborative Malware Detection on Android. In Proceedings of the IEEE International Conference on Communications (ICC), (2009).

    Google Scholar 

  10. M. Grace, Y. Zhou, Z. Wang, and X. Jiang: Systematic Detection of Capability Leaks in Stock Android Smartphones. In Proceedings of the 19th Annual Symposium on Network and Distributed System Security (NDSS), (2012).

    Google Scholar 

  11. I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani: Crowdroid: Behavior-based Mal- ware Detection System for Android. In Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, (2011).

    Google Scholar 

  12. A. Bose, X. Hu, K. G. Shin, and T. Park: Behavioral Detection of Malware on Mobile Handsets. In Proceedings of the 6th ACM International Conference on Mobile Systems, Applications, and Services, (2008).

    Google Scholar 

  13. A. S. Shamili, C. Bauckhage, and T. Alpcan: Malware Detection on Mobile Devices using Distributed Machine Learning. In Proceedings of 20th IEEE International Conference on Pattern Recognition (ICPR), (2010).

    Google Scholar 

  14. D. Venugopal and G. Hu: Efficient Signature based Malware Detection on Mobile Devices. In Journal of Mobile Information Systems, vol. 4, no. 1, pp. 33- 49 (2008).

    Google Scholar 

  15. A. D. Schmidt, R. Bye, H. G. Schmidt, J. Clausen, O. Kiraz, K. A. Yuksel, S. A. Camtepe, and S. Albayrak: Static Analysis of Executables for Collaborative Malware Detection on Android. In Proceedings of IEEE International Conference on Communications (ICC), (2009).

    Google Scholar 

  16. A. Shabtai: Malware Detection on Mobile Devices. In Proceedings of the 11th IEEE International Conference on Mobile Data Management (MDM), pp. (2010).

    Google Scholar 

  17. A. Dinaburg, P. Royal, M. Sharif, and W. Lee: Ether: Malware Analysis via Hardware Virtualization Extensions. In Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS), (2008).

    Google Scholar 

  18. Z. Aung and W. Zaw: Permission-Based Android Malware Detection. In International Journal of Scientific and Technology Research, vol. 2 (2013).

    Google Scholar 

  19. D. Barrera, H. G. Kayacik, P. C. van Oorschot, and A. Somayaji: A Methodology for Empirical Analysis of Permission-based Security Models and Its Application to Android. In Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS), (2010).

    Google Scholar 

  20. C.-Y. Huang, Y.-T. Tsai, and C.-H. Hsu: Performance Evaluation on Permission-based Detection for Android Malware. In Springer Berlin Heidelberg, pp. 111-120 (2013).

    Google Scholar 

  21. J. Cannady: Artificial Neural Networks for Misuse Detection. In Proceedings of National Information Systems Security Conference, (1998).

    Google Scholar 

  22. S. Mukkamala, G. Janoski, and A. Sung: Intrusion Detection Using Neural Networks and Support Vector Machines. In Proceedings of IEEE International Joint Conference on Neural Networks, (2002).

    Google Scholar 

  23. O. Linda, T. Vollmer, and M. Manic: Neural Network based Intrusion Detection System for Critical Infrastructures. In Proceedings of IEEE International Joint Conference on Neural Networks, (2009).

    Google Scholar 

  24. V. Golovko, S. Bezobrazov, P. Kachurka, and L. Vaitsekhovich: Neural Network and Artificial Immune Systems for Malware and Network Intrusion Detection. In Advances in Machine Learning II. Springer, pp. 485-513 (2010).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Yu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Yu, W., Ge, L., Xu, G., Fu, X. (2014). Towards Neural Network Based Malware Detection on Android Mobile Devices. In: Pino, R., Kott, A., Shevenell, M. (eds) Cybersecurity Systems for Human Cognition Augmentation. Advances in Information Security, vol 61. Springer, Cham. https://doi.org/10.1007/978-3-319-10374-7_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-10374-7_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-10373-0

  • Online ISBN: 978-3-319-10374-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics