Skip to main content

Android Malware Detection Mechanism Based on Bayesian Model Averaging

  • Conference paper
  • First Online:
Recent Findings in Intelligent Computing Techniques

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 707))

Abstract

Since Android is the most widely used operating system for mobile devices, it has been a target for widespread malware attacks. During the past years, many new malware detection mechanisms have been introduced for the Android platform. These methods are generally classified as static analysis and dynamic analysis methods. However, none of the existing mechanisms are able to detect the malware applications with reasonable false positive and negative rates. This is a major concern in the field of Android malware detection. In this paper, we propose a novel malware detection mechanism by combining the estimated malicious probability values of three distinct naive Bayes classifiers based on API calls, permissions, and system calls using Bayesian model averaging approach. The majority of the existing Android malwares have signatures in at least one of API calls, permissions, or system call sequences. Hence, the proposed mechanism can overcome the limitations of the existing static and dynamic malware detection mechanism to a good extent. Our experiments have shown that the proposed mechanism is more accurate than the existing static and dynamic malware detection mechanisms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Worldwide smartphone OS market share. http://www.idc.com

  2. A look at Google bouncer. http://blog.trendmicro.com

  3. Rastogi, V., Chen, Y., Jiang, X.: DroidChameleon: evaluating android anti-malware against transformation attacks. In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), pp. 329–334. ACM Digital Library, Arizona, USA (2013)

    Google Scholar 

  4. Xie, L., Zhang, X., Seifert, J.P., Zhu, S.: PBMDS: a behavior-based malware detection system for cellphone devices. In: Proceedings of the Third ACM Conference on Wireless Network Security, pp. 37–48 (2010)

    Google Scholar 

  5. Aafer, Y., Du, W., Yin, H.: DroidAPIMiner: mining API-level features for robust malware detection in android. Security and Privacy in Communication Networks. Springer, pp. 86–103 (2013)

    Google Scholar 

  6. Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 235–245. ACM Digital Library (2009)

    Google Scholar 

  7. Rovelli, P., Vigfússon, Y.: PMDS: permission-based malware detection system. In: International Conference on Information Systems Security. Springer, pp. 338–357 (2014)

    Google Scholar 

  8. Shabtai, A., Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., Weiss, Y.: Andromaly: a behavioral malware detection framework for android devices. J. Intell. Inf. Syst. 38(1), 161–190 (2012)

    Article  Google Scholar 

  9. Wei, Y., Zhang, H., Ge, L., Hardy, R.: On behavior-based detection of malware on android platform. In: Global Communications Conference (GLOBECOM), pp. 814–819. IEEE (2013)

    Google Scholar 

  10. Lewis, D.D.: Naive (Bayes) at forty: the independence assumption in information retrieval. In: European Conference on Machine Learning. Springer, Berlin, Heidelberg (1998)

    Chapter  Google Scholar 

  11. Apktool. http://ibotpeaches.github.io/Apktool/

  12. dex2jar. http://sourceforge.net/projects/dex2jar

  13. Azhagusundari, B., Thanamani, A.S.: Feature selection based on information gain. Int. J. Innov. Technol. Explor. Eng. (IJITEE) 2278–3075 (2013). ISSN

    Google Scholar 

  14. Cataldo, M., Mockus, A., Roberts, J.A., Herbsleb, J.D.: Software dependencies, work dependencies, and their impact on failures. IEEE Trans. Softw. Eng. 35(6), 864–878 (2009)

    Article  Google Scholar 

  15. Xiao, X., Jiang, Y., Liu, X., Ye, R.: Identifying Android malware with system call co-occurrence matrices. Trans. Emerg. Telecommun. Technol. (2016)

    Google Scholar 

  16. Strace. https://sourceforge.net/projects/strace

  17. Madigan, D., Raftery, A.E., Volinsky, C., Hoeting, J.: Bayesian model averaging. In: Proceedings of the AAAI Workshop on Integrating Multiple Learned Models, pp. 77–83, Portland (1996)

    Google Scholar 

  18. Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K.: DREBIN: effective and explainable detection of android malware in your pocket. In: Proceedings of the 20th Annual Network & Distributed System Security Symposium (NDSS), Siemens (2014)

    Google Scholar 

  19. Sbîrlea, D., Burke, M.G., Guarnieri, S., Pistoia, M., Sarkar, V.: Automatic detection of inter-application permission leaks in android applications. IBM Journal of Research and Development 57(6), 10–1 (2013)

    Article  Google Scholar 

  20. Butler, J.: DKOM (direct Kernel Object Manipulation). Black Hat USA (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Roopak .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Roopak, S., Thomas, T., Emmanuel, S. (2019). Android Malware Detection Mechanism Based on Bayesian Model Averaging. In: Sa, P., Bakshi, S., Hatzilygeroudis, I., Sahoo, M. (eds) Recent Findings in Intelligent Computing Techniques . Advances in Intelligent Systems and Computing, vol 707. Springer, Singapore. https://doi.org/10.1007/978-981-10-8639-7_9

Download citation

Publish with us

Policies and ethics