Skip to main content

Using Weighted Based Feature Selection Technique for Android Malware Detection

  • Conference paper
  • First Online:
Mobile and Wireless Technologies 2017 (ICMWT 2017)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 425))

Included in the following conference series:

Abstract

Recently, the popularity of mobile devices has risen drastically due to the increased functionality of the devices. This matter forces a large number of security challenges that need high consideration. Android malware detection method can be divided into two types, which are static and dynamic analysis. Static techniques are often prone to high false negative rates due to evolution in code basis and code repacking, although fast and efficient. While dynamic and behavior based analysis aims to provide methods for effectively and efficiently extracting unique patterns of each malware family based on its behavior. To address some of those shortcomings, the study uses permission-based Android malware feature as a basis for malware detection using weighted based technique.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abdullah Z, Saudi MM, Anuar NB (2014) Mobile botnet detection: Proof of concept. In: 2014 IEEE 5th control and system graduate research colloquium, pp 257–262

    Google Scholar 

  2. Kemp S (2016) We Are Social, “Digital in 2016”. www.wearesocial.com, http://wearesocial.com/sg/special-reports/digital-2016. Accessed 05 Nov 2016

  3. Abawajy J, Kelarev A (2017) Iterative classifier fusion system for the detection of android malware. IEEE Trans Big Data PP(99):1

    Article  Google Scholar 

  4. Vidas T, Votipka D, Christin N (2011) All your droid are belong to us: a survey of current android attacks. In: WOOT 2011, pp 81–90

    Google Scholar 

  5. Data G (2016) G Data Releases Mobile Malware Report for the Fourth Quarter of 2015. https://www.gdata-software.com/g-data/newsroom/news/article/g-data-releases-mobile-malware-report-for-the-fourth-quarter-of-2015. Accessed 05 Nov 2016. (Search Date 19/4/2016)

  6. Li W, Ge J, Dai G (2016) Detecting malware for android platform: An SVM-based approach. In: Proceedings - 2nd IEEE international conference on cyber security and cloud computing, CSCloud 2015 - IEEE international symposium of smart cloud, IEEE SSC 2015, pp 464–469

    Google Scholar 

  7. Varsha MV, Vinod P, Dhanya KA (2015) Heterogeneous feature space for Android malware detection. In: Eighth international conference on contemporary computing, (IC3) 2015, Noida, India, 20–22 August 2015, pp 383–388

    Google Scholar 

  8. Karim A (2016) On the analysis and detection of mobile botnet. J Univ Comput Sci 22(4):567–588

    Google Scholar 

  9. Zhou Y, Wang Z, Zhou W, Jiang X (2012) Hey, you, get off of my market: detecting malicious apps in official and alternative android markets. In: NDSS 2012, vol. 25(4), pp 50–52

    Google Scholar 

  10. Enck W, Gilbert P, Han S, Tendulkar V, Chun B-G, Cox LP, Jung J, McDaniel P, Sheth AN (2014) TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans Comput Syst 32(2):51–529

    Article  Google Scholar 

  11. Wu W-C, Hung S-H (2014) DroidDolphin: A dynamic android malware detection framework using big data and machine learning. In: Proceedings of the 2014 conference on research in adaptive and convergent systems, pp 247–252

    Google Scholar 

  12. Arp D, Spreitzenbarth M, Hubner M, Gascon H, Rieck K (2014) DREBIN: Effective and explainable detection of android malware in your pocket. In: NDSS

    Google Scholar 

  13. Hall M, Frank E, Holmes G, Pfahringer B, Reutemann P, Witten IH (2009) The WEKA data mining software: an update. ACM SIGKDD Explor Newsl 11(1):10–18

    Article  Google Scholar 

  14. Android Developers. Permissions. https://developer.android.com/index.html, https://developer.android.com/guide/topics/permissions/index.html. Accessed 22 Dec 2016

  15. Shabtai A, Moskovitch R, Elovici Y, Glezer C (2009) Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey. Inf Secur Tech Rep 14(1):16–29

    Article  Google Scholar 

Download references

Acknowledgement

The authors express appreciation to the Universiti Tun Hussein Onn Malaysia (UTHM). This research is supported by Postgraduate Research Grant vot number U610, Short Term Grant vot number U653 and Gates IT Solution Sdn. Bhd. under its publication scheme.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Isredza Rahmi A. Hamid .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Science+Business Media Singapore

About this paper

Cite this paper

Mazlan, N.H., Hamid, I.R.A. (2018). Using Weighted Based Feature Selection Technique for Android Malware Detection. In: Kim, K., Joukov, N. (eds) Mobile and Wireless Technologies 2017. ICMWT 2017. Lecture Notes in Electrical Engineering, vol 425. Springer, Singapore. https://doi.org/10.1007/978-981-10-5281-1_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-5281-1_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-5280-4

  • Online ISBN: 978-981-10-5281-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics