Malware Detection in Android Using Data Mining

This article describes how as day-to-day Android users are increasing, the Internet has become the type of environment preferred by attackers to inject malicious packages. This is content with the intention of gathering critical information, spying on user details, credentials, call logs, contact details, and tracking user location. Regrettably it is very hard to detect malware even with antivirus software/packages. In addition, this type of attack is increasing day by day. In this article the authors have chosen a Supervised Learning Classification Tree-based algorithm to detect malware on the data set. Comparison amongst all the classifiers on the basis of accuracy and execution time are used to build the classifier model which has the highest executed detections.

[1]  Zhuoqing Morley Mao,et al.  Automated Classification and Analysis of Internet Malware , 2007, RAID.

[2]  Alva Erwin,et al.  Analysis of Machine learning Techniques Used in Behavior-Based Malware Detection , 2010, 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies.

[3]  Julian C. Bradfield,et al.  A general definition of malware , 2010, Journal in Computer Virology.

[4]  Samanvay Gupta Types of Malware and its Analysis , 2013 .

[5]  J. Kent Information gain and a general measure of correlation , 1983 .

[6]  Dolly Uppal,et al.  Basic survey on Malware Analysis, Tools and Techniques , 2014 .

[7]  Christopher Krügel,et al.  A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.

[8]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[9]  Ron Kohavi,et al.  The Power of Decision Tables , 1995, ECML.

[10]  Kulthida Tuamsuk,et al.  Data Mining and Its Applications for Knowledge Management: A Literature Review from 2007 to 2012 , 2012, ArXiv.

[11]  J. Ross Quinlan,et al.  C4.5: Programs for Machine Learning , 1992 .

[12]  Robert Susmaga,et al.  Confusion Matrix Visualization , 2004, Intelligent Information Systems.

[13]  C. E. SHANNON,et al.  A mathematical theory of communication , 1948, MOCO.

[14]  Moshe Kam,et al.  Toward an Automatic, Online Behavioral Malware Classification System , 2013, 2013 IEEE 7th International Conference on Self-Adaptive and Self-Organizing Systems.

[15]  Nilanjan Dey,et al.  Systematic Analysis of Applied Data Mining Based Optimization Algorithms in Clinical Attribute Extraction and Classification for Diagnosis of Cardiac Patients , 2016, Applications of Intelligent Optimization in Biology and Medicine.