scholarly journals Dynamic detection of mobile malware using smartphone data and machine learning

Author(s):  
Sebastian Panman de Wit ◽  
Doina Bucur ◽  
Jeroen van der Ham

Mobile malware are malicious programs that target mobile devices. They are an increasing problem, as seen in the rise of detected mobile malware samples per year. The number of active smartphone users is expected to grow, stressing the importance of research on the detection of mobile malware. Detection methods for mobile malware exist but are still limited. In this paper, we propose dynamic malware-detection methods that use device information such as the CPU usage, battery usage, and memory usage for the detection of 10 subtypes of Mobile Trojans on the Android Operating System (OS). We use a real-life sensor dataset containing device and malware data from 47 users for a year (2016) to create multiple mobile malware detection methods. We examine which features, i.e. aspects, of a device, are most important to monitor to detect (subtypes of) Mobile Trojans. The focus of this paper is on dynamic hardware features. Using these dynamic features we apply the following machine learning classifiers: Random Forest, K-Nearest Neighbour, and AdaBoost.

2014 ◽  
Vol 20 (1) ◽  
pp. 343-357 ◽  
Author(s):  
Fairuz Amalina Narudin ◽  
Ali Feizollah ◽  
Nor Badrul Anuar ◽  
Abdullah Gani

Information ◽  
2021 ◽  
Vol 12 (5) ◽  
pp. 185
Author(s):  
Vasileios Kouliaridis ◽  
Georgios Kambourakis

Year after year, mobile malware attacks grow in both sophistication and diffusion. As the open source Android platform continues to dominate the market, malware writers consider it as their preferred target. Almost strictly, state-of-the-art mobile malware detection solutions in the literature capitalize on machine learning to detect pieces of malware. Nevertheless, our findings clearly indicate that the majority of existing works utilize different metrics and models and employ diverse datasets and classification features stemming from disparate analysis techniques, i.e., static, dynamic, or hybrid. This complicates the cross-comparison of the various proposed detection schemes and may also raise doubts about the derived results. To address this problem, spanning a period of the last seven years, this work attempts to schematize the so far ML-powered malware detection approaches and techniques by organizing them under four axes, namely, the age of the selected dataset, the analysis type used, the employed ML techniques, and the chosen performance metrics. Moreover, based on these axes, we introduce a converging scheme which can guide future Android malware detection techniques and provide a solid baseline to machine learning practices in this field.


2020 ◽  
Vol 105 ◽  
pp. 102169 ◽  
Author(s):  
Fabio Martinelli ◽  
Francesco Mercaldo ◽  
Vittoria Nardone ◽  
Antonella Santone ◽  
Gigliola Vaglini

2018 ◽  
Vol 433-434 ◽  
pp. 346-364 ◽  
Author(s):  
Zhenxiang Chen ◽  
Qiben Yan ◽  
Hongbo Han ◽  
Shanshan Wang ◽  
Lizhi Peng ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document