Skip to main content

Statistical Approach Using Meta Features for Android Malware Detection System

  • Conference paper
  • First Online:
Cyber Security

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 729))

  • 1517 Accesses

Abstract

In this paper, a static analysis malware detection system based on machine learning techniques and making use of features like hardware components, requested permissions, application components, and filtered intents are extracted from various applications. Prominent features are selected as a part of dimensionality reduction using GSS coefficient and mutual information. Experiment has been evaluated on 3000 malware samples from Drebin dataset and on 1631 benign samples collected from Google Play Store. High ROC curve of 0.998 has been obtained for model developed using individual attributes with overall scanning time of 1.49 s. However, when the optimal features extracted from each category of attributes were aggregated a remarkable improvement in F-measure, i.e., 0.996 was noticed with a low FPR value of 0.003 concluding the fact that the approach can be used to support commercial AV.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Grace MC, Zhou Y, Zhang Q, Zou S, Jiang X (2012) Riskranker: scalable and accurate zero-day android malware detection. In: MobiSys, pp 281–294. ACM

    Google Scholar 

  2. Zhou W, Zhou Y, Jiang X, Ning P (2012) Detecting repackaged smartphone applications in third-party android marketplaces. In: Proceedings of second ACM conference on data and application security and privacy, pp 317–326. ACM

    Google Scholar 

  3. Arp D, Spreitzenbarth M, Hubner M, Gascon H, Rieck K (2014) Drebin: effective and explainable detection of android malware in your pocket. In: NDSS. The Internet Society

    Google Scholar 

  4. Wang W, Wang X, Feng D, Liu J, Han Z, Zhang X (2014) Exploring permission-induced risk in android applications for malicious application detection. IEEE Trans Inf Forensics Secur 9(11):1869–1882

    Article  Google Scholar 

  5. Peng H, Gates CS, Sarma BP, Li N, Qi Y, Potharaju R, NitaRotaru C, Molloy I (2012) Using probabilistic generative models for ranking risks of android apps. In: ACM conference on computer and communications security, pp 241–252. ACM

    Google Scholar 

  6. Sarma BP, Li N, Gates CS, Potharaju R, Nita-Rotaru C, Molloy I (2012) Android permissions: a perspective combining risks and benefits. In: SACMAT, pp 13–22. ACM

    Google Scholar 

  7. Kang H, Jang J, Mohaisen A, Kim HK (2015) Detecting and classifying android malware using static analysis along with creator information. Int J Distrib Sens Netw, 479174: 9

    Google Scholar 

  8. Chakradeo S, Reaves B, Traynor P, Enck W (2013) MAST: triage for market-scale mobile malware analysis. In: Proceedings of security and privacy in wireless and mobile networks, ACM

    Google Scholar 

  9. Shabtai A, Kanonov U, Elovici Y, Glezer C, Weiss Y (2012) Andromaly: a behavioral malware detection framework for android devices. J Intell Inf Syst 38(1):161–190

    Article  Google Scholar 

  10. Enck W, Ongtang M, McDaniel PD (2009) On lightweight mobile phone application certification. In: ACM conference on computer and communications security, pp 235–245. ACM

    Google Scholar 

  11. Felt AP, Chin E, Hanna S, Song D, Wagner D (2011) Android permissions demystified. In: ACM conference on computer and communications security, pp 627–638. ACM

    Google Scholar 

  12. Wu D, Mao C, Wei T, Lee H, Wu K (2012) Droidmat: android malware detection through manifest and API calls tracing. In: AsiaJCIS, pp 62–69. IEEE

    Google Scholar 

  13. Cen L, Gates C, Si L, Li N (2013) A probabilistic discriminant model for android malware detection with decompiled code. In: Dependable and secure computing, IEEE

    Google Scholar 

  14. Drebin Dataset. http://user.cs.uni-goettingen.de/~darp/drebin/

  15. Androguard. http://code.google.com/p/androguard/

  16. Largeron C, Moulin C, Gry M (2011) Entropy based feature selection for text categorization. In: SAC, pp 924–928. ACM

    Google Scholar 

  17. Sebastiani F (2002) Machine learning in automated text categorization. ACM Comput Surv 34:147

    Article  Google Scholar 

  18. Weka. http://www.cs.waikato.ac.nz/ml/weka

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Meenu Mary John .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

John, M.M., Vinod, P. (2018). Statistical Approach Using Meta Features for Android Malware Detection System. In: Bokhari, M., Agrawal, N., Saini, D. (eds) Cyber Security. Advances in Intelligent Systems and Computing, vol 729. Springer, Singapore. https://doi.org/10.1007/978-981-10-8536-9_27

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8536-9_27

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8535-2

  • Online ISBN: 978-981-10-8536-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics