Android malware detection based on permission combinations

Android malware detection based on permission combinations

0.00 Avg rating0 Votes
Article ID: iaor201529179
Volume: 10
Issue: 4
Start Page Number: 315
End Page Number: 326
Publication Date: Oct 2015
Journal: International Journal of Simulation and Process Modelling
Authors: , ,
Keywords: Bayesian analysis, classification, machine learning, mobile telephones, safety, software
Abstract:

Considering the resource limitations of mobile terminals, such as memory capacity and battery power, it will take a large portion of resources if the complex malicious detection system is implemented in mobile terminals. We proposed the training part to be implemented on the backend server and the detecting part to be implemented on the mobile terminals. In addition, we apply permission information to the applications installed on the terminals, because permission mechanism controls the applications' accesses to sensitive information. In our method, we first employ apriori algorithm to define the permission combinations to be the initial feature and calculate the threat level of permission based on the relative deviation distances. The distances are then used as weights to the classification algorithm. In the process, we apply an integrated feature selection approach based on the principle of self‐learning to extract important features to form the feature set. Finally, the minimum risk Bayes algorithm is introduced to classify unknown applications. The experimental results show that our method is effective on imbalanced datasets.

Reviews

Required fields are marked *. Your email address will not be published.