Abstract
Android platforms are known as the less security smartphone devices. The increasing number of malicious apps published on Android markets suppose an important threat to users sensitive data, compromising more devices everyday. The commercial solutions that aims to fight against this malware are based on signature methodologies whose detection ratio is low. Furthermore, these engines can be easily defeated by obfuscation techniques, which are extremely common in app plagiarism. This work aims to improve malware detection using only the binary information and the permissions that are normally used by the anti-virus engines, in order to provide a scalable solution based on machine learning. In order to evaluate the performance of this approach, we carry out our experiments using 5000 malware and 5000 benign-ware, and compare the results with 56 Anti-Virus Engines from VirusTotal.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Daniel Arp, Michael Spreitzenbarth, Malte Hübner, Hugo Gascon, Konrad Rieck, and CERT Siemens. Drebin: Effective and explainable detection of android malware in your pocket. In Proceedings of the Annual Symposium on Network and Distributed System Security (NDSS), 2014.
Gema Bello-Orgaz and David Camacho. Evolutionary clustering algorithm for community detection using graph-based information. In Evolutionary Computation (CEC), 2014 IEEE Congress on, pages 930–937. IEEE, 2014.
Gema Bello-Orgaz, Jason J Jung, and David Camacho. Social big data: Recent achievements and new challenges. Information Fusion, 28:45–59, 2016.
Mihai Christodorescu, Somesh Jha, Sanjit Seshia, Dawn Song, Randal E Bryant, et al. Semantics-aware malware detection. In Security and Privacy, 2005 IEEE Symposium on, pages 32–46. IEEE, 2005.
Pedro Domingos and Michael Pazzani. On the optimality of the simple bayesian classifier under zero-one loss. Machine learning, 29(2-3):103–130, 1997.
Marti A. Hearst, Susan T Dumais, Edgar Osman, John Platt, and Bernhard Scholkopf. Support vector machines. Intelligent Systems and their Applications, IEEE, 13(4):18–28, 1998.
Tin Kam Ho. The random subspace method for constructing decision forests. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 20(8):832–844, 1998.
Nwokedi Idika and Aditya P Mathur. A survey of malware detection techniques. Purdue University, 48, 2007.
Takamasa Isohara, Keisuke Takemori, and Ayumu Kubota. Kernel-based behavior analysis for android malware detection. In Computational Intelligence and Security (CIS), 2011 Seventh International Conference on, pages 1011–1015. IEEE, 2011.
Daniel T Larose. Discovering knowledge in data: an introduction to data mining. John Wiley & Sons, 2014.
Hector D Menendez, David F Barrero, and David Camacho. A genetic graphbased approach for partitional clustering. International journal of neural systems, 24(03):1430008, 2014.
Héctor David Menéndez and David Camacho. Mogcla: A multi-objective genetic clustering algorithm for large data analysis. In Proceedings of the Companion Publication of the 2015 on Genetic and Evolutionary Computation Conference, pages 1437–1438. ACM, 2015.
Andreas Moser, Christopher Kruegel, and Engin Kirda. Limits of static analysis for malware detection. In Computer security applications conference, 2007. ACSAC 2007. Twenty-third annual, pages 421–430. IEEE, 2007.
Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, and Saumya Debray. A semantics-based approach to malware detection. ACM SIGPLAN Notices, 42(1):377–388, 2007.
J Ross Quinlan and Ronald L Rivest. Inferring decision trees using the minimum description lenght principle. Information and computation, 80(3):227–248, 1989.
Víctor Rodríguez-Fernáandez, Héctor D Menéndez, and David Camacho. Automatic profile generation for uav operators using a simulation-based training environment. Progress in Artificial Intelligence, 5(1):37–46, 2016.
Victor Rodriguez-Fernandez, Cristian Ramirez-Atencia, and David Camacho. A multi-uav mission planning videogame-based framework for player analysis. In Evolutionary Computation (CEC), 2015 IEEE Congress on, pages 1490–1497. IEEE, 2015.
Igor Santos, Felix Brezo, Javier Nieves, Yoseba K Penya, Borja Sanz, Carlos Laorden, and Pablo G Bringas. Idea: Opcode-sequence-based malware detection. In Engineering Secure Software and Systems, pages 35–43. Springer, 2010.
Asaf Shabtai, Uri Kanonov, Yuval Elovici, Chanan Glezer, and Yael Weiss. andromaly: a behavioral malware detection framework for android devices. Journal of Intelligent Information Systems, 38(1):161–190, 2012.
Kimberly Tam, Salahuddin J Khan, Aristide Fattori, and Lorenzo Cavallaro. Copperdroid: Automatic reconstruction of android malware behaviors. In Proc. of the Symposium on Network and Distributed System Security (NDSS), 2015.
Mu Zhang, Yue Duan, Heng Yin, and Zhiruo Zhao. Semantics-aware android malware classification using weighted contextual api dependency graphs. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pages 1105–1116. ACM, 2014.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Martín, A., Menéndez, H.D., Camacho, D. (2017). String-based Malware Detection for Android Environments. In: Badica, C., et al. Intelligent Distributed Computing X. IDC 2016. Studies in Computational Intelligence, vol 678. Springer, Cham. https://doi.org/10.1007/978-3-319-48829-5_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-48829-5_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48828-8
Online ISBN: 978-3-319-48829-5
eBook Packages: EngineeringEngineering (R0)