Abstract
Recently, the popularity of mobile devices has risen drastically due to the increased functionality of the devices. This matter forces a large number of security challenges that need high consideration. Android malware detection method can be divided into two types, which are static and dynamic analysis. Static techniques are often prone to high false negative rates due to evolution in code basis and code repacking, although fast and efficient. While dynamic and behavior based analysis aims to provide methods for effectively and efficiently extracting unique patterns of each malware family based on its behavior. To address some of those shortcomings, the study uses permission-based Android malware feature as a basis for malware detection using weighted based technique.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abdullah Z, Saudi MM, Anuar NB (2014) Mobile botnet detection: Proof of concept. In: 2014 IEEE 5th control and system graduate research colloquium, pp 257–262
Kemp S (2016) We Are Social, “Digital in 2016”. www.wearesocial.com, http://wearesocial.com/sg/special-reports/digital-2016. Accessed 05 Nov 2016
Abawajy J, Kelarev A (2017) Iterative classifier fusion system for the detection of android malware. IEEE Trans Big Data PP(99):1
Vidas T, Votipka D, Christin N (2011) All your droid are belong to us: a survey of current android attacks. In: WOOT 2011, pp 81–90
Data G (2016) G Data Releases Mobile Malware Report for the Fourth Quarter of 2015. https://www.gdata-software.com/g-data/newsroom/news/article/g-data-releases-mobile-malware-report-for-the-fourth-quarter-of-2015. Accessed 05 Nov 2016. (Search Date 19/4/2016)
Li W, Ge J, Dai G (2016) Detecting malware for android platform: An SVM-based approach. In: Proceedings - 2nd IEEE international conference on cyber security and cloud computing, CSCloud 2015 - IEEE international symposium of smart cloud, IEEE SSC 2015, pp 464–469
Varsha MV, Vinod P, Dhanya KA (2015) Heterogeneous feature space for Android malware detection. In: Eighth international conference on contemporary computing, (IC3) 2015, Noida, India, 20–22 August 2015, pp 383–388
Karim A (2016) On the analysis and detection of mobile botnet. J Univ Comput Sci 22(4):567–588
Zhou Y, Wang Z, Zhou W, Jiang X (2012) Hey, you, get off of my market: detecting malicious apps in official and alternative android markets. In: NDSS 2012, vol. 25(4), pp 50–52
Enck W, Gilbert P, Han S, Tendulkar V, Chun B-G, Cox LP, Jung J, McDaniel P, Sheth AN (2014) TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans Comput Syst 32(2):51–529
Wu W-C, Hung S-H (2014) DroidDolphin: A dynamic android malware detection framework using big data and machine learning. In: Proceedings of the 2014 conference on research in adaptive and convergent systems, pp 247–252
Arp D, Spreitzenbarth M, Hubner M, Gascon H, Rieck K (2014) DREBIN: Effective and explainable detection of android malware in your pocket. In: NDSS
Hall M, Frank E, Holmes G, Pfahringer B, Reutemann P, Witten IH (2009) The WEKA data mining software: an update. ACM SIGKDD Explor Newsl 11(1):10–18
Android Developers. Permissions. https://developer.android.com/index.html, https://developer.android.com/guide/topics/permissions/index.html. Accessed 22 Dec 2016
Shabtai A, Moskovitch R, Elovici Y, Glezer C (2009) Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey. Inf Secur Tech Rep 14(1):16–29
Acknowledgement
The authors express appreciation to the Universiti Tun Hussein Onn Malaysia (UTHM). This research is supported by Postgraduate Research Grant vot number U610, Short Term Grant vot number U653 and Gates IT Solution Sdn. Bhd. under its publication scheme.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Science+Business Media Singapore
About this paper
Cite this paper
Mazlan, N.H., Hamid, I.R.A. (2018). Using Weighted Based Feature Selection Technique for Android Malware Detection. In: Kim, K., Joukov, N. (eds) Mobile and Wireless Technologies 2017. ICMWT 2017. Lecture Notes in Electrical Engineering, vol 425. Springer, Singapore. https://doi.org/10.1007/978-981-10-5281-1_7
Download citation
DOI: https://doi.org/10.1007/978-981-10-5281-1_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-5280-4
Online ISBN: 978-981-10-5281-1
eBook Packages: EngineeringEngineering (R0)