A review on mobile threats and machine learning based detection approaches

The research of mobile threats detection using machine learning algorithms have got much attention in recent years due to increase of attacks. In this paper, mobile vulnerabilities were examined based on attack types. In order to prevent or detect these attacks machine learning methods used were analyzed and papers published in between 2009 and 2014 have been evaluated. Most important mobile vulnerabilities implementation format for these threats, detection methods and prevention approaches with the help of machine learning algorithms are presented. The obtained results are compared from their achievements were summarized. The results have shown that selecting and using datasets play an important role on the success of the system. Additionally, supervised learning techniques produce better results while compared with unsupervised ones in intrusion detection.

[1]  Hsinchun Chen,et al.  Machine learning for attack vector identification in malicious source code , 2013, 2013 IEEE International Conference on Intelligence and Security Informatics.

[2]  Baigal tugsSanjaa,et al.  Malware detection using linear SVM , 2013, Ifost.

[3]  Robert Shimonski,et al.  Mobile Phone Tracking , 2015 .

[4]  Aiman Abu Samra,et al.  Analysis of Clustering Technique in Android Malware Detection , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[5]  Mi-Jung Choi,et al.  Linux kernel-based feature selection for Android malware detection , 2014, The 16th Asia-Pacific Network Operations and Management Symposium.

[6]  Md. Rafiqul Islam,et al.  An automated classification system based on the strings of trojan and virus families , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).

[7]  Alva Erwin,et al.  Analysis of Machine learning Techniques Used in Behavior-Based Malware Detection , 2010, 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies.

[8]  Luke Rondeau Mobile Device Vulnerabilities & Securities , 2014 .

[9]  Yuval Elovici,et al.  Automated Static Code Analysis for Classifying Android Applications Using Machine Learning , 2010, 2010 International Conference on Computational Intelligence and Security.

[10]  Ainuddin Wahid Abdul Wahab,et al.  A review on feature selection in mobile malware detection , 2015, Digit. Investig..

[11]  Shanqing Guo,et al.  Application of string kernel based support vector machine for malware packer identification , 2013, The 2013 International Joint Conference on Neural Networks (IJCNN).

[12]  Christian Bauckhage,et al.  Malware Detection on Mobile Devices Using Distributed Machine Learning , 2010, 2010 20th International Conference on Pattern Recognition.

[13]  Assaf Neuberger,et al.  Adware detection and privacy control in mobile devices , 2014, 2014 IEEE 28th Convention of Electrical & Electronics Engineers in Israel (IEEEI).

[14]  Igor Santos,et al.  Opcode sequences as representation of executables for data-mining-based unknown malware detection , 2013, Inf. Sci..

[15]  Jules White,et al.  Applying machine learning classifiers to dynamic Android malware detection at scale , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[16]  Lior Rokach,et al.  Novel active learning methods for enhanced PC malware detection in windows OS , 2014, Expert Syst. Appl..

[17]  Elisa Bertino,et al.  Detecting mobile malware threats to homeland security through static analysis , 2014, J. Netw. Comput. Appl..

[18]  Liwei Zhang,et al.  Detecting Trojan horses based on system behavior using machine learning method , 2010, 2010 International Conference on Machine Learning and Cybernetics.

[19]  Sheikh Iqbal Ahamed,et al.  ePet: when cellular phone learns to recognize its owner , 2009, SafeConfig '09.

[20]  Zane Markel,et al.  Building a machine learning classifier for malware detection , 2014, 2014 Second Workshop on Anti-malware Testing Research (WATeR).

[21]  Yuval Elovici,et al.  Unknown malcode detection via text categorization and the imbalance problem , 2008, 2008 IEEE International Conference on Intelligence and Security Informatics.

[22]  Latifur Khan,et al.  A Machine Learning Approach to Android Malware Detection , 2012, 2012 European Intelligence and Security Informatics Conference.

[23]  Luisa Verdoliva,et al.  Iris liveness detection for mobile devices based on local descriptors , 2015, Pattern Recognit. Lett..

[24]  Dragos Gavrilut,et al.  Malware detection using machine learning , 2009, 2009 International Multiconference on Computer Science and Information Technology.

[25]  Jack W. Stokes,et al.  Large-scale malware classification using random projections and neural networks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[26]  John G. Iannarelli,et al.  The Threats of Today and Tomorrow , 2015 .

[27]  Hugo Proença,et al.  Guest editorial introduction to the special executable issue on "Mobile Iris CHallenge Evaluation part I (MICHE I)" , 2015, Pattern Recognit. Lett..

[28]  Md. Rafiqul Islam,et al.  Hybrids of support vector machine wrapper and filter based framework for malware detection , 2016, Future Gener. Comput. Syst..

[29]  Salvatore J. Stolfo,et al.  Data mining methods for detection of new malicious executables , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[30]  Xingquan Zhu,et al.  Machine Learning for Android Malware Detection Using Permission and API Calls , 2013, 2013 IEEE 25th International Conference on Tools with Artificial Intelligence.

[31]  George Stanescu Risk Assessment Model for Mobile Malware , 2015 .

[32]  Timo Hämäläinen,et al.  Support vector machine integrated with game-theoretic approach and genetic algorithm for the detection and classification of malware , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).

[33]  Karen Scarfone,et al.  A standard for developing secure mobile applications , 2014, Comput. Stand. Interfaces.

[34]  Sihan Qing,et al.  A survey and trends on Internet worms , 2005, Comput. Secur..

[35]  Mi-Jung Choi,et al.  Analysis of Android malware detection performance using machine learning classifiers , 2013, 2013 International Conference on ICT Convergence (ICTC).

[36]  Lior Rokach,et al.  Improving malware detection by applying multi-inducer ensemble , 2009, Comput. Stat. Data Anal..

[37]  Xinjian Chen,et al.  A Fingerprint Authentication System Based on Mobile Phone , 2005, AVBPA.

[38]  Simin Nadjm-Tehrani,et al.  Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.

[39]  Alessandro Armando,et al.  Security considerations related to the use of mobile devices in the operation of critical infrastructures , 2014, Int. J. Crit. Infrastructure Prot..

[40]  P. V. Shijo,et al.  Integrated Static and Dynamic Analysis for Malware Detection , 2015 .

[41]  Yuval Elovici,et al.  Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey , 2009, Inf. Secur. Tech. Rep..

[42]  P. Vinod,et al.  A machine learning approach for linux malware detection , 2014, 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT).

[43]  Ping Wang,et al.  Malware behavioural detection and vaccine development by using a support vector model classifier , 2015, J. Comput. Syst. Sci..