| Literature DB >> 34084934 |
Abstract
BACKGROUND: Technological developments have a significant effect on the development of smart devices. The use of smart devices has become widespread due to their extensive capabilities. The Android operating system is preferred in smart devices due to its open-source structure. This is the reason for its being the target of malware. The advancements in Android malware hiding and detection avoidance methods have overridden traditional malware detection methods.Entities:
Keywords: Deep learning; Malware detection; Mobile security; Permission; Static analysis
Year: 2021 PMID: 34084934 PMCID: PMC8157142 DOI: 10.7717/peerj-cs.533
Source DB: PubMed Journal: PeerJ Comput Sci ISSN: 2376-5992
Figure 1Overview of the proposed model for android malware detection.
Figure 2Apk file structure (Ren et al., 2020).
Statistics of distribution of malware and benign applications in the datasets.
| Dataset | |||
|---|---|---|---|
| Malicious | Unknown | Total | |
| Drebin | 5,498 | 62 | 5,560 |
| Genome | 1,163 | 16 | 1,179 |
| Benign | |||
| Proposed model original dataset | 961 | 112 | 1,073 |
Deep learning results with different combination of hidden layers.
| Total trainable parameters (DNN Model) | TPR (sensitivity) | TNR (specifity) | FPR | FNR | Precision | Recall | Accuracy | AUC | WFM | Runtime (min:sec) |
|---|---|---|---|---|---|---|---|---|---|---|
| 20152 (50,50) | 0.946 | 0.987 | 0.129 | 0.053 | 0.987 | 0.992 | 0.980 | 0.955 | 0.982 | 00:40 |
| 195902 (300,300) | 0.942 | 0.987 | 0.129 | 0.057 | 0.987 | 0.991 | 0.980 | 0.955 | 0.982 | 01:45 |
| 45352 (100,50,100) | 0.954 | 0.981 | 0.181 | 0.045 | 0.982 | 0.993 | 0.980 | 0.940 | 0.981 | 00:50 |
| 166002 (300,100,300) | 0.937 | 0.986 | 0.137 | 0.062 | 0.986 | 0.990 | 0.980 | 0.952 | 0.982 | 01:49 |
| 65502 (100,100,100,100) | 0.942 | 0.986 | 0.137 | 0.057 | 0.988 | 0.991 | 0.980 | 0.957 | 0.982 | 00:52 |
| 376502 (300,300,300,300) | 0.956 | 0.987 | 0.129 | 0.043 | 0.987 | 0.993 | 0.980 | 0.956 | 0.983 | 02:05 |
| 75602 (100,100,100,100,100) | 0.942 | 0.986 | 0.013 | 0.058 | 0.986 | 0.991 | 0.980 | 0.953 | 0.982 | 00:54 |
Figure 3Proposed DNN model layer structure.
Figure 4Accuracy graph.
Figure 5ROC curve for Android permissions.
Figure 6Confusion matrix.
Results for 11 machine learning algorithms and deep learning.
| Algorithms | TPR | TNR | FPR | FNR | Precision | Recall | Accuracy | WFM |
|---|---|---|---|---|---|---|---|---|
| KNeighbours | 0.8901 | 0.9777 | 0.022 | 0.109 | 0.8438 | 0.8901 | 0.9672 | 0.8663 |
| RF | 0.9489 | 0.9815 | 0.018 | 0.051 | 0.8698 | 0.9489 | 0.9777 | 0.9076 |
| SVC | 0.9588 | 0.9786 | 0.021 | 0.041 | 0.8490 | 0.9588 | 0.9764 | 0.9006 |
| Decision tree | 0.9535 | 0.9793 | 0.020 | 0.046 | 0.8542 | 0.9535 | 0.9764 | 0.9011 |
| GaussianNB | 0.7835 | 0.9188 | 0.081 | 0.216 | 0.3958 | 0.7835 | 0.9102 | 0.5260 |
| LinearDiscriminant | 0.9416 | 0.9657 | 0.034 | 0.584 | 0.7552 | 0.9416 | 0.9633 | 0.8382 |
| AdaBoost | 0.9419 | 0.9778 | 0.022 | 0.058 | 0.8434 | 0.9419 | 0.9738 | 0.8901 |
| GradientBoosting | 0.9689 | 0.9736 | 0.026 | 0.031 | 0.8125 | 0.9689 | 0.9731 | 0.8839 |
| ExtraTree | 0.9503 | 0.9851 | 0.014 | 0.104 | 0.8958 | 0.9503 | 0.9810 | 0.9223 |
| XGBoost | 0.9530 | 0.9800 | 0.020 | 0.046 | 0.8594 | 0.9530 | 0.9770 | 0.9041 |
| DL(376502(300,300,300,300)) | 0.9910 | 0.9870 | 0.029 | 0.043 | 0.9890 | 0.9910 | 0.9803 | 0.9820 |
The comparison of classification performance among former methods and proposed method.
| Similar works | Selected features | Num of benign apps | Num of malware apps | Num of neurons or classification method | Precision | Recall | Accuracy | F-measure |
|---|---|---|---|---|---|---|---|---|
| ASAEF ( | Metadata, permissions, intent filter, activity, services | 37,224 | 33,259 | N-gram, signature | 96.4% | 96.1% | 97.2% | 96.2% |
| FingerPrinting ( | Family DNA | 100 | 928 | Signature | 89% | 84% | N/A | 85% |
| DroidChain ( | Permissions, API call, behaviour chain | – | 1,260 | Warshall | 91% | 92% | 93% | N/A |
| Shhadat ( | Heuristic strategy, dynamic analysis | 172 | 984 | RF | 96.4% | 87.3% | 97.8% | 91.2% |
| DroidDet ( | Permissions, system events, sensitive API and URL | 1,065 | 1,065 | SVM | 88.16% | 88.40% | 88.26% | N/A |
| DL-Droid ( | Application attributes, actions, events, permissions | 11,505 | 19,620 | 300, 100, 300 | 94.08% | 97.78% | 94.95% | 95.89% |
| SRBM ( | Static and dynamic feature | 39,931 | 40,923 | RBM | – | – | 0.804 | 84.3% |
| Lu ( | API calls | 1,400 | 1,400 | Correntropy, CNN | 95.0% | 76.0% | 84.25% | 84.0% |
| ProDroid ( | API calls | 500 | 1,500 | HMM | 93.0% | 95.0% | 94.5% | 93.9% |
| Proposed model | Application permissions | 961 | 6,661 | 300, 300, 300, 300 | 98.9% | 99.1% | 98.03% | 99.0% |