Opcode-Based Android Malware Detection Using Machine Learning Techniques

Abstract

Today Android applications are widely used by billions of users to perform different activity. So malware target the Android phone frequently. The new malware sample is a major issue and signature based technique are unable to find out new malware sample. In this paper author will appliance an approach to detect the unfamiliar Android malware using machine learning techniques with a high detection rate. We adopt sampling technique based on the sensitive opcodes sequence. Finally, we evaluate our method on AndroZoo dataset (15000 malware and 15000 benign Apks), and select the top 20 malware families for experiments. The experimental results show that the Total Accuracy 95.3%, 92.16%, and 92.6% with random forest, XGBosst, and Decision tree. 

Country : India

1 Sonal Pandey2 Ram Lal

  1. NITTTR Chandigarh, India
  2. Computer Service Centre, IIT Delhi, India

IRJIET, Volume 5, Issue 7, July 2021 pp. 56-61

doi.org/10.47001/IRJIET/2021.507010

References

  1. Q. Heal, “QUARTERLY THREAT REPORT Q2-2020,” 2020.
  2. Neil, “An Overview of the Android Architecture.” Available: https://www.techotopia.com/index.php/An_Overview_of_the_Android_Architecture . [Accessed: 15-Sept-2020]
  3. P. Szor, “The Art of Computer Virus Research and Defense,” Symantec Press Publisher, vol. 43, no. 03, pp. 180-200, 2005.
  4. X. Ge, Y. Pan, Y. Fan, and C. Fang, “AMDroid: Android Malware Detection Using Function Call Graphs,” Proc. - Companion 19th IEEE Int. Conf. Softw. Qual. Reliab. Secur. QRS-C 2019, pp. 71–77, 2019.
  5. N. Huang, M. Xu, N. Zheng, T. Qiao, and K. K. R. Choo, “Deep android malware classification with API-based feature graph,” Proc. - 2019 18th IEEE Int. Conf. Trust. Secur. Priv. Comput. Commun. IEEE Int. Conf. Big Data Sci. Eng. Trust. 2019, pp. 296–303, 2019.
  6. Z. Zhang, C. Chang, P. Han, and H. Zhang, “Packed malware variants detection using deep belief networks,” MATEC Web Conf., vol. 309, p. 02002, 2020.
  7. J. Hernandez Jimenez and K. Goseva-Popstojanova, “Malware Detection Using Power Consumption and Network Traffic Data,” Proc. - 2019 2nd Int. Conf. Data Intell. Secur. ICDIS 2019, pp. 53–59, 2019.
  8. Y. Zhang, Q. Huang, X. Ma, Z. Yang, and J. Jiang, “Using multi-features and ensemble learning method for imbalanced Malware classification,” Proc. - 15th IEEE Int. Conf. Trust. Secur. Priv. Comput. Commun. 10th IEEE Int. Conf. Big Data Sci. Eng. 14th IEEE Int. Symp. Parallel Distrib. Proce, pp. 965–973, 2016.
  9. A.Govindaraju, “Exhaustive Statistical Analysis for Detection of Metamorphic Malware,” 2010.
  10. H. Florian, “Introduction to Malware Analysis Techniques,” 2015.
  11. J.-Y. Xu, a. H. Sung, P. Chavez, and S. Mukkamala, “Polymorphic malicious executable scanner by API sequence analysis,” Fourth Int. Conf. Hybrid Intell. Syst., pp. 0–5, 2004.
  12. A.Sharma and S. K. Sahay, “An effective approach for classification of advanced malware with high accuracy,” Int. J. Secur. its Appl., vol. 10, no. 4, pp. 249–266, 2016.
  13. S. K. Sharma, Sanjay and Krishna, C Rama and Sahay, “Detection of advanced malware by machine learning techniques,” in Soft Computing: Theories and Applications, 2019, pp. 333–342.
  14. F. A. Narudin, A. Feizollah, N. B. Anuar, and A. Gani, “Evaluation of machine learning classifiers for mobile malware detection,” Soft Comput., vol. 20, no. 1, pp. 343–357, 2016.
  15. J. Li, L. Sun, Q. Yan, Z. Li, W. Srisa-An, and H. Ye, “Significant Permission Identification for Machine-Learning-Based Android Malware Detection,” IEEE Trans. Ind. Informatics, vol. 14, no. 7, pp. 3216–3225, 2018.
  16. Jyoti Landage, M. P. Wankhade, “Malware and Malware Detection Techniques: A Survey,” International Journal of Engineering Research & Technology (IJERT), vol. 2, Issue 12, pp. 61–68, 2018.
  17. R. H. D. Ke Xu, Yingjiu Li, “Iccdetector: Icc-based malware detection on android,” in Information Forensics and Security, 2016, pp. 1252–1264.
  18. K. Wain and Y. Au, “by A thesis submitted in conformity with the requirements Graduate Department of Electrical and Computer Engineering c Copyright 2012 by Kathy Wain Yee Au,” 2012.
  19. G. Tao, Z. Zheng, Z. Guo, and M. R. Lyu, “MalPat: Mining Patterns of Malicious and Benign Android Apps via Permission-Related APIs,” IEEE Trans. Reliab., vol. 67, no. 1, pp. 355–369, 2018.
  20. M. C. Sanjeev Das, Yang Liu, Wei Zhang, “Semantics-based online malware detection: Towards efficient real-time pro- tection against malware,” in Information Forensics and Security, 2016, pp. 289–302.
  21. A.Sharma and S. K. Sahay, “Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey,” Int. J. Comput. Appl., vol. 90, no. 2, pp. 7–11, 2014.
  22. K. Griffin, S. Schneider, X. Hu, and T. C. Chiueh, “Automatic generation of string signatures for malware detection,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2009, vol. 5758 LNCS, pp. 101–120.
  23. I.A. Saeed, A. Selamat, and A. M. A. Abuagoub, “A Survey on Malware and Malware Detection Systems,” vol. 67, no. 16, pp. 25–31, 2013.
  24. A.Shabtai, R. Moskovitch, Y. Elovici, and C. Glezer, “Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey,” Inf. Secur. Tech. Rep., vol. 14, no. 1, pp. 16–29, 2009.
  25. M. G. Schultz, E. Eskin, and S. J. Stolfo, “Data Mining Methods for Detection of New Malicious Executables,” 2001.
  26. D. Bilar, “Opcodes As Predictor for Malware,” Int. J. Electron. Secur. Digit. Forensic, vol. 1, no. 2, pp. 156–168, 2007.
  27. K. Allix, T. F. Bissyandé, Q. Jérome, J. Klein, R. State, and Y. Le Traon, “Large-scale machine learning-based malware detection,” in Proceedings of the 4th ACM conference on Data and application security and privacy - CODASPY ’14, 2014, pp. 163–166.
  28. C. Wang, Z. Qin, J. Zhang, and H. Yin, “A malware variants detection methodology with an opcode based feature method and a fast density based clustering algorithm,” pp. 481–487, 2016.
  29. E. B. Bahman Rashidi, Carol Fung, “Android resource usage risk assessment using hidden Markov model and online learning,” in Computers & Security, 2017, pp. 90–107.
  30. H. J. Zhu, Z. H. You, Z. X. Zhu, W. L. Shi, X. Chen, and L. Cheng, “DroidDet: Effective and robust detection of android malware using static analysis along with rotation forest model,” Neurocomputing, vol. 272, pp. 638–646, 2018.
  31. A.Sharma and S. K. Sahay, “An investigation of the classifiers to detect android malicious apps,” 2016.
  32. D. Ö. Şahin, O. E. Kural, S. Akleylek, and E. Kiliç, “New results on permission based static analysis for Android malware,” 6th Int. Symp. Digit. Forensic Secur. ISDFS 2018 - Proceeding, vol. 2018-Janua, pp. 1–4, 2018.
  33. J. Rudy, “Adapting Text Categorization for Manifest based Android Malware Detection,” Computer Science Journal, vol. 19, no. 3, pp. 257–279, 2018.
  34. L. Taheri, A. F. A. Kadir, and A. H. Lashkari, “Extensible android malware detection and family classification using network-flows and API-calls,” Proc. - Int. Carnahan Conf. Secur. Technol., vol. 2019-October, no. Cic, 2019.
  35. M. Kruczkowski and E. Niewiadomska-Szynkiewicz, “Comparative study of supervised learning methods for 6 malware analysis,” J. Telecommun. Inf. Technol., vol. 2014, no. 4, pp. 24–33, 2014.
  36. I.Firdausi, C. Lim, A. Erwin, and A. S. Nugroho, “Analysis of machine learning techniques used in behavior-based malware detection,” Proc. - 2010 2nd Int. Conf. Adv. Comput. Control Telecommun. Technol. ACT 2010, pp. 201–203, 2010.
  37. N. Milosevic, A. Dehghantanha, and K. K. R. Choo, “Machine learning aided Android malware classification,” Comput. Electr. Eng., vol. 61, pp. 266–274, 2017.
  38. Ke Xu, Yingjiu Li, Robert H. Deng “ICC Detector: ICC Based Malware Detection on Android,” IEEE Transactions on Information Forensics and Security, vol: 11, Issue: 6, pp. 1252–1264, 2016.
  39. Neha Tarar, Shweta Sharma, Dr. C. Rama Krishna “Analysis and Classification of Android Malware using Machine Learning Algorithms,” IEEE 3rd international conference on Inventive Computation Technologies, vol: 10, Issue: 3, 2018.
  40. Andrea Saracino, Daniele Sgandurra, Gianluca Dini and Fabio Martinelli “MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention,” IEEE Transactions on Dependable and Secure Computing, vol: 15, pp. 83 - 97 2018.
  41. Sonal Pandey, C. Rama Krishna, Ashu Sharma, Sanjay Sharma “Detection of Android Malware Using Machine Learning Techniques,” Innovations in Computer Science and Engineering, vol: 171, pp. 663 - 675 2021.
  42. Haipeng Cai, Na Meng, Barbara Ryder, Daphne Yao “DroidCat: Effective Android Malware Detection and Categorization via App-Level Profiling,” IEEE Transactions on Information Forensics and Security, vol: 14, pp. 1455 - 1470 2015.