4.6 Article

Malware Detection: A Framework for Reverse Engineered Android Applications Through Machine Learning Algorithms

期刊

IEEE ACCESS
卷 10, 期 -, 页码 89031-89050

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2022.3149053

关键词

Smart phones; Malware; Feature extraction; Machine learning algorithms; Predictive models; Machine learning; Static analysis; Android applications; benign; feature extraction; malware detection; reverse engineering; machine learning

资金

  1. UKRI [EP/R007195/1, EP/N510129/1, EP/S035362/1]

向作者/读者索取更多资源

Android has become a favorite target for hackers due to its popularity, making it a challenge for security providers to detect and identify malware embedded in Android applications. Machine learning approaches have emerged as a more effective way to tackle the complexity and originality of Android threats. This research paper proposes a model that incorporates innovative static feature sets and uses machine learning algorithms to detect vulnerabilities in Smartphone applications, achieving a high accuracy rate and low false positive rate.
Today, Android is one of the most used operating systems in smartphone technology. This is the main reason, Android has become the favorite target for hackers and attackers. Malicious codes are being embedded in Android applications in such a sophisticated manner that detecting and identifying an application as a malware has become the toughest job for security providers. In terms of ingenuity and cognition, Android malware has progressed to the point where they're more impervious to conventional detection techniques. Approaches based on machine learning have emerged as a much more effective way to tackle the intricacy and originality of developing Android threats. They function by first identifying current patterns of malware activity and then using this information to distinguish between identified threats and unidentified threats with unknown behavior. This research paper uses Reverse Engineered Android applications' features and Machine Learning algorithms to find vulnerabilities present in Smartphone applications. Our contribution is twofold. Firstly, we propose a model that incorporates more innovative static feature sets with the largest current datasets of malware samples than conventional methods. Secondly, we have used ensemble learning with machine learning algorithms i.e., AdaBoost, Support Vector Machine (SVM), etc. to improve our model's performance. Our experimental results and findings exhibit 96.24% accuracy to detect extracted malware from Android applications, with a 0.3 False Positive Rate (FPR). The proposed model incorporates ignored detrimental features such as permissions, intents, Application Programming Interface (API) calls, and so on, trained by feeding a solitary arbitrary feature, extracted by reverse engineering as an input to the machine.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据