Skip to main content

“Emerging Trends in Computational Intelligence to Solve Real-World Problems” Android Malware Detection Using Machine Learning

  • Conference paper
  • First Online:
International Conference on Innovative Computing and Communications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1394))

Abstract

Being the most used operating system makes Android vulnerable to various kinds of malware attacks. This is due to the fact that most applications require several permissions which are necessary for installation or smooth operability. Some Android applications are not certified by legitimate organisations and may contain malware which can steal private user information. This has increased the interest of applying machine learning algorithms for Android malware detection. In this research paper, we work with a dataset comprising of 215 permissions and API calls of 3799 Android applications. We evaluate machine learning classification algorithms like random forest, decision tree, Naive Bayes and support vector machine for detecting malicious Android applications based on permissions and API calls model. The results show that RF performs the best giving an accuracy of 98.15% using k-fold cross-validation for k = 5 and a mean accuracy of 97.79%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. J.S. Park, T.Y. Youn, H.B. Kim, K.H. Rhee, S.U. Shin, Smart contract-based review system for an IoT data marketplace. Sensors 18, 3577 (2018)

    Google Scholar 

  2. B.L. Risteska Stojkoska, K.V. Trivodaliev, A review of Internet of Things for smart home: Challenges and solutions. J. Clean. Prod. 140, 1454–1464 (2017)

    Google Scholar 

  3. Y. Zhou, X. Jiang, Dissecting android malware: characterization and evolution, in Proceedings of the 33rd IEEE Symposium on Security and Privacy (Oakland 2012), San Francisco, CA, May 2012

    Google Scholar 

  4. J. Walls, K.K.R. Choo, A review of free cloud-based anti-malware apps for android, in Proceedings of the 14th IEEE International Conference, vol 1. Helsinki, Finland, 20–22 Aug 2015, pp. 1053–1058

    Google Scholar 

  5. H. Chen, J. Su, L. Qiao, Q. Xin, H. Chen, J. Su, L. Qiao, Q. Xin, Malware collusion attack against SVM: issues and countermeasures. Appl. Sci. 8, 1718 (2018)

    Google Scholar 

  6. B. Dogru, O. Kiraz, Web-based android malicious software detection and classification system. Appl. Sci. 8, 1622 (2018)

    Google Scholar 

  7. T.M. Chen, J. Blasco, J. Alzubi, O. Alzubi, Intrusion Detection (IET Publishing, 2014). https://doi.org/10.1049/etr.2014.0007

  8. Symantec, Latest intelligence for March 2016, in Symantec Social Blog (2016)

    Google Scholar 

  9. L. Cen, C.S. Gates, L. Si, N. Li, A probabilistic discriminative model for android malware detection with decompiled source code. IEEE Trans. Secure Dependable Comput. 12(4) (2015)

    Google Scholar 

  10. A. Mahindru, P. Singh, Dynamic permissions based android malware detection using machine learning techniques, in Proceedings of 10th Innovations in Software Engineering Conference, Jaipur, India, 5–7 Feb 2017, pp. 202–210

    Google Scholar 

  11. D. Gupta, J.J.P.C. Rodrigues, S. Sundaram, A. Khanna, V. Korotaev, V.H.C. Albuquerque, Usability feature extraction using modified crow search algorithm: a novel approach. Neural Comput. Appl. (Springer, 2018). https://doi.org/10.1007/s00521-018-3688-6

  12. I. Burguera, U. Zurutuza, S. Nadjm-Tehrani, Crowdroid: behavior-based malware detection system for android, in SPSM’11 (ACM, Oct 2011)

    Google Scholar 

  13. M. Fan, J. Liu, W. Wang, H. Li, Z. Tian, T. Liu, DAPASA: Detecting android piggybacked apps through sensitive subgraph analysis. IEEE Trans. Inf. Forensics Secur. 12(8), 1772–1785 (2016)

    Google Scholar 

  14. M. Zhao, F. Ge, T. Zhang, Z. Yuan, Antimaldroid: an efficient SVM based malware detection framework for android, in ICICA Communications in Computer and Information Science (Springer, 2011), pp. 158166

    Google Scholar 

  15. W.-C. Wu, S.-H. Hung, Droiddolphin: a dynamic Android malware detection framework using big data and machine learning, in Proceedings of 2014 ACM Conference on Research in Adaptive and Convergent Systems, (RACS’14), NY, USA, pp. 247–252

    Google Scholar 

  16. A. Sharma, S.K. Dash, Mining API calls and permissions for android malware detection, in Cryptology and Network Security. CANS 2014. Lecture Notes in Computer Science eds. by D. Gritzalis, A. Kiayias, I. Askoxylakis, vol. 8813 (Springer, Cham, 2014)

    Google Scholar 

  17. T. Petsas, G. Voyatzis, E. Athanasopoulos, M. Polychronakis, S. Ioannidis, Rage against the virtual machine: hindering dynamic analysis of android malware, in Proceedings of the Seventh European Workshop on System Security (ACM, 2014), p. 5

    Google Scholar 

  18. F. Idrees, M. Rajarajan, M. Conti, T.M. Chen, Y. Rahulamathavan, PIndroid: a novel Android malware detection system using ensemble learning methods. Comput. Secur. 68, 36–46 (2017)

    Article  Google Scholar 

  19. Z. Ni, M. Yang, Z. Ling, J.N. Wu, J. Luo, Real-time detection of malicious behavior in android apps, in Proceedings of International Conference on Advanced Cloud and Big Data (CBD), Chengdu, 2016, pp. 221–227

    Google Scholar 

  20. W. Enck, P. Gilbert, S. Han, V. Tendulkar, B.-G. Chun, L.P. Cox, J. Jung, P. McDaniel, A.N. Sheth, “Taintdroid”. ACM Trans. Comput. Syst. (TOCS) 32(2), 5 (2014)

    Google Scholar 

  21. D. Arp, M. Spreitzenbarth, M. Hübner, H. Gascon, K. Rieck, C. Siemens, Drebin: Effective and explainable detection of android malware in your pocket, in Proceedings of the Annual Symposium on Network and Distributed System Security (NDSS) (2014) [22] Suleiman Y. Yerima and Sakir Sezer, “DroidFusion : A Novel Multilevel Classifier Fusion Approach for Android Malware Detection” in IEEE Transactions on Cybernetics January 2018

    Google Scholar 

  22. S.Y. Yerima, S. Sezer, DroidFusion: a novel multilevel classifier fusion approach for android malware detection. in IEEE Transactions on Cybernetics, Jan 2018

    Google Scholar 

  23. A. Arora, S.K. Peddoju, M. Conti, PermPair: android malware detection using permission pairs. IEEE Tran. Inf. Forensics Secur. 15, 1968–1982 (2020). https://doi.org/10.1109/TIFS.2019.2950134

  24. X. Xiao, S. Zhang, F. Mercaldo, et al. Android malware detection based on system call sequences and LSTM. Multimed. Tools Appl. 3979–3999 (2019). https://doi.org/10.1007/s11042-017-5104-0

  25. A. Mahindru, A.L. Sangal, MLDroid—framework for Android malware detection using machine learning techniques. Neural Comput. Appl. (2020). https://doi.org/10.1007/s00521-020-05309-4

  26. X. Liu, Z. Zhou, W. Diao, Z. Li, K. Zhang, An empirical study on android for saving non-shared data on public storage, in ICT Systems Security and Privacy Protection (Springer, 2015), pp. 542–556

    Google Scholar 

  27. V. Babu Rajesh, P. Reddy, P. Himanshu, M.U. Patil, Droidswan: detecting malicious android applications based on static feature analysis. https://doi.org/10.5121/csit.2015.51315

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Singh, D., Karpa, S., Chawla, I. (2022). “Emerging Trends in Computational Intelligence to Solve Real-World Problems” Android Malware Detection Using Machine Learning. In: Khanna, A., Gupta, D., Bhattacharyya, S., Hassanien, A.E., Anand, S., Jaiswal, A. (eds) International Conference on Innovative Computing and Communications. Advances in Intelligent Systems and Computing, vol 1394. Springer, Singapore. https://doi.org/10.1007/978-981-16-3071-2_28

Download citation

Publish with us

Policies and ethics