DeepAMD: Detection and identification of Android malware using high-efficient Deep Artificial Neural Network

Abstract Android smartphones are being utilized by a vast majority of users for everyday planning, data exchanges, correspondences, social interaction, business execution, bank transactions, and almost in each walk of everyday lives. With the expansion of human reliance on smartphone technology, cyberattacks against these devices have surged exponentially. Smartphone applications use permissions to utilize various functionalities of the smartphone that can be maneuvered to launch an attack or inject malware by hackers. Existing studies present various approaches to detect Android malware but lack early detection and identification. Accordingly, there is a dire need to craft an efficient mechanism for malicious applications’ detection before they exploit the data. In this paper, a novel approach DeepAMD to defend against real-world Android malware using deep Artificial Neural Network (ANN) has been adopted including an efficiency comparison of DeepAMD with conventional machine learning classifiers and state-of-the-art studies based on performance measures such as accuracy, recall, f-score, and precision. As per the experimental analysis, DeepAMD outperforms other approaches in detecting and identifying malware attacks on both Static as well as Dynamic layers. On the Static layer, DeepAMD achieves the highest accuracy of 93.4% for malware classification, 92.5% for malware category classification, and 90% for malware family classification. On the Dynamic layer, DeepAMD achieves the highest accuracy of 80.3% for malware category classification and 59% for malware family classification in comparison with the state-of-the-art techniques.

[1]  Rong Chen,et al.  Android Malware Identification Based on Traffic Analysis , 2019, ICAIS.

[2]  Patrick P. K. Chan,et al.  Static detection of Android malware by using permissions and API calls , 2014, 2014 International Conference on Machine Learning and Cybernetics.

[3]  Assaf Neuberger,et al.  Adware detection and privacy control in mobile devices , 2014, 2014 IEEE 28th Convention of Electrical & Electronics Engineers in Israel (IEEEI).

[4]  Jin Kwak,et al.  Real Time Android Ransomware Detection by Analyzed Android Applications , 2019, 2019 International Conference on Electronics, Information, and Communication (ICEIC).

[5]  Franklin Tchakounté,et al.  Detection of Android Malware based on Sequence Alignment of Permissions , 2019 .

[6]  Samanvay Gupta Types of Malware and its Analysis , 2013 .

[7]  B. B. Gupta,et al.  Towards Privacy Risk Analysis in Android Applications Using Machine Learning Approaches , 2019, Int. J. E Serv. Mob. Appl..

[8]  Ali Kashif Bashir,et al.  Intelligent Reward-Based Data Offloading in Next-Generation Vehicular Networks , 2020, IEEE Internet of Things Journal.

[9]  Ali Feizollah,et al.  AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection , 2017, Comput. Secur..

[10]  Arash Habibi Lashkari,et al.  Extensible Android Malware Detection and Family Classification Using Network-Flows and API-Calls , 2019, 2019 International Carnahan Conference on Security Technology (ICCST).

[11]  Kouichi Sakurai,et al.  Detection of Android API Call Using Logging Mechanism within Android Framework , 2013, SecureComm.

[12]  Gautam Srivastava,et al.  KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks , 2020, IEEE Access.

[13]  Win Zaw,et al.  Permission-Based Android Malware Detection , 2013 .

[14]  Pavol Zavarsky,et al.  Experimental Analysis of Ransomware on Windows and Android Platforms: Evolution and Characterization , 2016, FNC/MobiSPC.

[15]  El-Sayed M. El-Alfy,et al.  Benchmarking Open-Source Android Malware Detection Tools , 2019, 2019 2nd IEEE Middle East and North Africa COMMunications Conference (MENACOMM).

[16]  Thar Baker,et al.  AlphaLogger: detecting motion-based side-channel attack using smartphone keystrokes , 2020, Journal of Ambient Intelligence and Humanized Computing.

[17]  Anshul Arora,et al.  Malware Detection Using Network Traffic Analysis in Android Based Mobile Devices , 2014, 2014 Eighth International Conference on Next Generation Mobile Apps, Services and Technologies.

[18]  Zhenlong Yuan,et al.  DroidDetector: Android Malware Characterization and Detection Using Deep Learning , 2016 .

[19]  Khaled W. Mahmoud,et al.  Android Malware Detection and Categorization Based on Conversation-level Network Traffic Features , 2019, 2019 International Arab Conference on Information Technology (ACIT).

[20]  Yajin Zhou,et al.  Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.

[21]  Celestine Iwendi,et al.  Analyzing the Effectiveness and Contribution of Each Axis of Tri-Axial Accelerometer Sensor for Accurate Activity Recognition , 2020, Sensors.

[22]  Andrew Honig,et al.  Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software , 2012 .

[23]  Chun-Ying Huang,et al.  Performance Evaluation on Permission-Based Detection for Android Malware , 2013 .

[24]  Ali A. Ghorbani,et al.  Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.

[25]  Ali A. Ghorbani,et al.  Towards a Network-Based Framework for Android Malware Detection and Characterization , 2017, 2017 15th Annual Conference on Privacy, Security and Trust (PST).

[26]  Tuan Nguyen,et al.  Detecting sensitive data leakage via inter-applications on Android using a hybrid analysis technique , 2017, Cluster Computing.

[27]  Emre Erturk A case study in open source software security and privacy: Android adware , 2012, World Congress on Internet Security (WorldCIS-2012).

[28]  Xiaojiang Du,et al.  IoT malicious traffic identification using wrapper-based feature selection mechanisms , 2020, Comput. Secur..

[29]  Hahn-Ming Lee,et al.  DroidMat: Android Malware Detection through Manifest and API Calls Tracing , 2012, 2012 Seventh Asia Joint Conference on Information Security.

[30]  Chao Wang,et al.  Research on data mining of permissions mode for Android malware detection , 2018, Cluster Computing.

[31]  Mahdi Abadi,et al.  SMSBotHunter: A Novel Anomaly Detection Technique to Detect SMS Botnets , 2018, 2018 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC).

[32]  Ali A. Ghorbani,et al.  Toward Developing a Systematic Approach to Generate Benchmark Android Malware Datasets and Classification , 2018, 2018 International Carnahan Conference on Security Technology (ICCST).

[33]  Abdul Rehman Javed,et al.  Ensemble Adaboost classifier for accurate and fast detection of botnet attacks in connected vehicles , 2020, Trans. Emerg. Telecommun. Technol..

[34]  Fakhroddin Noorbehbahani,et al.  Analysis of Machine Learning Techniques for Ransomware Detection , 2019, 2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC).

[35]  Celestine Iwendi,et al.  Analysis of security and energy efficiency for shortest route discovery in low‐energy adaptive clustering hierarchy protocol using Levenberg‐Marquardt neural network and gated recurrent unit for intrusion detection system , 2020, Trans. Emerg. Telecommun. Technol..

[36]  Hein S. Venter,et al.  Testing the harmonised digital forensic investigation process model-using an Android mobile phone , 2013, 2013 Information Security for South Africa.

[37]  Jing Yu,et al.  Access Control to Prevent Attacks Exploiting Vulnerabilities of WebView in Android OS , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.

[38]  Ali Kashif Bashir,et al.  PARCIV: Recognizing physical activities having complex interclass variations using semantic data of smartphone , 2020, Softw. Pract. Exp..

[39]  Ahmed Raza Rajput,et al.  A Survey on Smartphones Security: Software Vulnerabilities, Malware, and Attacks , 2020, ArXiv.

[40]  Sanggeun Song,et al.  The Effective Ransomware Prevention Technique Using Process Monitoring on Android Platform , 2016, Mob. Inf. Syst..

[41]  Ayman I. Kayssi,et al.  Android SMS Malware: Vulnerability and Mitigation , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.