Comparative Analysis of Feature Selection Methods and Machine Learning Algorithms in Permission based Android Malware Detection

The most anticipated cell phone working frameworks available in the market is Google android cell phone board. The open source android board raises trivial problems related to malevolent applications (Apps) and enables designers to take full preferred standpoint of the portable activity framework. On one hand, the distinction of android assimilates consideration of most engineers for building up their applications on this board. Then again, the expanded quantities of utilizations, readies an appropriate inclined for a few clients to create distinctive classes of malware and embed them in Google android advertise or other outsider markets as kindhearted applications. The issue of identifying such malware presents an elite test because of the confined assets accessible and insufficient benefits conceded to the client, yet additionally introduces extraordinary open door in the required metadata connected to every application. Consequently, in this work, android malwares are identified based on the permissions it demands from the client. A few machine learning calculations are being utilized in the discovery of android malware based on the group of permissions empowered for each application. This paper makes an endeavor to examine the execution of different attribute selection methods, like Relief Attribute Evaluator, Gain Ratio Attribute Evaluator, Correlation based Feature Subset Evaluator (CFS), Chi-Square (CH) examination and various machine learning calculations, as Naïve Bayes (NB), J48, Random Forest (RF), Support Vector Machine (SVM), Multi-Layer Perceptron based Neural Network (MLPNN), k-Nearest Neighbor (kNN) and hence an arrangement of results acquired for permission based malware recognition and categorization demonstrates that Chi-Square attribute selection technique and SVM machine learning calculation are overtaking the other feature selection and machine learning methods correspondingly.

[1]  A. B. Gadicha,et al.  Analysis of Malware Detection Techniques in Android , 2014 .

[2]  S. Vijayarani,et al.  Comparative Analysis of Bayes and Lazy Classification Algorithms , 2013 .

[3]  Mahmut Ozer,et al.  EEG signals classification using the K-means clustering and a multilayer perceptron neural network model , 2011, Expert Syst. Appl..

[4]  Ali Selamat,et al.  A Survey on Malware and Malware Detection Systems , 2013 .

[5]  Yuval Elovici,et al.  “Andromaly”: a behavioral malware detection framework for android devices , 2012, Journal of Intelligent Information Systems.

[6]  Sakir Sezer,et al.  A New Android Malware Detection Approach Using Bayesian Classification , 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA).

[7]  Ali Selamat,et al.  A survey on malware propagation, analysis, and detection , 2013 .

[8]  Xingquan Zhu,et al.  Machine Learning for Android Malware Detection Using Permission and API Calls , 2013, 2013 IEEE 25th International Conference on Tools with Artificial Intelligence.

[9]  Igor Kononenko,et al.  Estimating Attributes: Analysis and Extensions of RELIEF , 1994, ECML.

[10]  Vladimir N. Vapnik,et al.  The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.

[11]  Win Zaw,et al.  Permission-Based Android Malware Detection , 2013 .

[12]  P Ravi Kiran Varma,et al.  Android mobile security by detecting and classification of malware based on permissions using machine learning algorithms , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).

[13]  Richard E. Harang,et al.  Rapid Permissions-Based Detection and Analysis of Mobile Malware Using Random Decision Forests , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.

[14]  Mark A. Hall,et al.  Correlation-based Feature Selection for Machine Learning , 2003 .

[15]  Shigeki Goto,et al.  Detecting Android Malware by Analyzing Manifest Files , 2013 .

[16]  Madihah Mohd Saudi,et al.  An Efficient Framework to Build Up Malware Dataset , 2013 .

[17]  J. Ross Quinlan,et al.  C4.5: Programs for Machine Learning , 1992 .

[18]  Sara Najari,et al.  Malware Detection Using Data Mining Techniques , 2014 .

[19]  Ian H. Witten,et al.  The WEKA data mining software: an update , 2009, SKDD.

[20]  Simin Nadjm-Tehrani,et al.  Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.

[21]  Phaninder Reddy,et al.  ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS , 2015 .

[22]  Cengiz Acartürk,et al.  The analysis of feature selection methods and classification algorithms in permission based Android malware detection , 2014, 2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).

[23]  Yajin Zhou,et al.  Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.

[24]  Pat Langley,et al.  Estimating Continuous Distributions in Bayesian Classifiers , 1995, UAI.