Android malware detection with ensemble of androidmanifest features
The popularity of Android Operating System rose gradually in the past years. Android becomes the first choice of the users in the second quarter of 2019 with more than 75 percent of worldwide market share. Furthermore, most of the users are keeping their personal information on their mobile devices....
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2019
|
Subjects: | |
Online Access: | http://psasir.upm.edu.my/id/eprint/83852/1/FSKTM%202019%2018%20-%20IR.pdf http://psasir.upm.edu.my/id/eprint/83852/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Putra Malaysia |
Language: | English |
id |
my.upm.eprints.83852 |
---|---|
record_format |
eprints |
spelling |
my.upm.eprints.838522020-10-23T09:18:57Z http://psasir.upm.edu.my/id/eprint/83852/ Android malware detection with ensemble of androidmanifest features Mohammad Salehi, . The popularity of Android Operating System rose gradually in the past years. Android becomes the first choice of the users in the second quarter of 2019 with more than 75 percent of worldwide market share. Furthermore, most of the users are keeping their personal information on their mobile devices. Consequently, Android is the main target of attackers on mobile and portable devices. In order to protect users’ privacy and data, numerous researches have been done with different approaches. There are two main methods for analyzing and investigating applications. The first one is a static analysis which is the most common method that extracts static features from Android Package (APK) files. AndroidManifest features are extracted from APK files for analyzing malware in this research. The second method is the dynamic analysis that collects data while operating the application in an isolated environment. Mostly, machine learning techniques are used in researches for classifying unknown samples. This study comes with a new framework which is named as a Composite of AndroidManifest Features (CAMF) to detect Android malware. In the proposed framework, three different static features are extracted like, requested permissions, hardware features, and intent-filters. A single merged feature vector is created from the feature matrix of each static feature. This vector is used as input data to our supervised machine learning models. As a result, CAMF framework minimizes the number of features to 141. Hence, it reduced the false negative rate to 1.201 percent in comparison to the previous study which is nearly 5 percent in their string feature analyzes. 2019-06 Thesis NonPeerReviewed text en http://psasir.upm.edu.my/id/eprint/83852/1/FSKTM%202019%2018%20-%20IR.pdf Mohammad Salehi, . (2019) Android malware detection with ensemble of androidmanifest features. Masters thesis, Universiti Putra Malaysia. Malware (Computer software) Androids |
institution |
Universiti Putra Malaysia |
building |
UPM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Putra Malaysia |
content_source |
UPM Institutional Repository |
url_provider |
http://psasir.upm.edu.my/ |
language |
English |
topic |
Malware (Computer software) Androids |
spellingShingle |
Malware (Computer software) Androids Mohammad Salehi, . Android malware detection with ensemble of androidmanifest features |
description |
The popularity of Android Operating System rose gradually in the past years. Android becomes the first choice of the users in the second quarter of 2019 with more than 75 percent of worldwide market share. Furthermore, most of the users are keeping their personal information on their mobile devices. Consequently, Android is the main target of attackers on mobile and portable devices. In order to protect users’ privacy and data, numerous researches have been done with different approaches. There are two main methods for analyzing and investigating applications. The first one is a static analysis which is the most common method that extracts static features from Android Package (APK) files. AndroidManifest features are extracted from APK files for analyzing malware in this research. The second method is the dynamic analysis that collects data while operating the application in an isolated environment. Mostly, machine learning techniques are used in researches for classifying unknown samples. This study comes with a new framework which is named as a Composite of AndroidManifest Features (CAMF) to detect Android malware. In the proposed framework, three different static features are extracted like, requested permissions, hardware features, and intent-filters. A single merged feature vector is created from the feature matrix of each static feature. This vector is used as input data to our supervised machine learning models. As a result, CAMF framework minimizes the number of features to 141. Hence, it reduced the false negative rate to 1.201 percent in comparison to the previous study which is nearly 5 percent in their string feature analyzes. |
format |
Thesis |
author |
Mohammad Salehi, . |
author_facet |
Mohammad Salehi, . |
author_sort |
Mohammad Salehi, . |
title |
Android malware detection with ensemble of androidmanifest features |
title_short |
Android malware detection with ensemble of androidmanifest features |
title_full |
Android malware detection with ensemble of androidmanifest features |
title_fullStr |
Android malware detection with ensemble of androidmanifest features |
title_full_unstemmed |
Android malware detection with ensemble of androidmanifest features |
title_sort |
android malware detection with ensemble of androidmanifest features |
publishDate |
2019 |
url |
http://psasir.upm.edu.my/id/eprint/83852/1/FSKTM%202019%2018%20-%20IR.pdf http://psasir.upm.edu.my/id/eprint/83852/ |
_version_ |
1681490883490349056 |