A Method for Automatic Android Malware Detection Based on Static Analysis and Deep Learning
The computers nowadays are being replaced by the smartphones for the most of the internet users around the world, and Android is getting the most of the smartphone systems' market. This rise of the usage of smartphones generally, and the Android system specifically, leads to a strong need to ef...
Gespeichert in:
Veröffentlicht in: | IEEE access 2022, Vol.10, p.1-1 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | IEEE access |
container_volume | 10 |
creator | Ibrahim, Mulhem Issa, Bayan Jasser, Muhammed Basheer |
description | The computers nowadays are being replaced by the smartphones for the most of the internet users around the world, and Android is getting the most of the smartphone systems' market. This rise of the usage of smartphones generally, and the Android system specifically, leads to a strong need to effectively secure Android, as the malware developers are targeting it with sophisticated and obfuscated malware applications. Consequently, a lot of studies were performed to propose a robust method to detect and classify android malicious software (malware). Some of them were effective, some were not; with accuracy below 90%, and some of them are being outdated; using datasets that became old containing applications for old versions of Android that are rarely used today. In this paper, a new method is proposed by using static analysis and gathering as most useful features of android applications as possible, along with two new proposed features, and then passing them to a functional API deep learning model we made. This method was implemented on a new and classified android application dataset, using 14079 malware and benign samples in total, with malware samples classified into four malware classes. Two major experiments with this dataset were implemented, one for malware detection with the dataset samples categorized into two classes as just malware and benign, the second one was made for malware detection and classification, using all the five classes of the dataset. As a result, our model overcomes the related works when using just two classes with F1-score of 99.5%. Also, high malware detection and classification performance was obtained by using the five classes, with F1-score of 97%. |
doi_str_mv | 10.1109/ACCESS.2022.3219047 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_ACCESS_2022_3219047</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9936621</ieee_id><doaj_id>oai_doaj_org_article_46d2c68f989e4c70868cf0ff24cb486a</doaj_id><sourcerecordid>2736886185</sourcerecordid><originalsourceid>FETCH-LOGICAL-c408t-e736b82f30c2b83ce64916bd6429f217a41f616677145b4c848f0de62094429c3</originalsourceid><addsrcrecordid>eNpNkU1LAzEQhhdRUNRf4CXguTVfnU2Oa_2EiofqyUPIJhPdUjc12SL-e6NbxLnMMDzvmwlvVZ0xOmWM6otmPr9eLqeccj4VnGkq673qiDPQEzETsP9vPqxOc17RUqqsZvVR9dKQBxzeoichJtJsh_huh86Rpvcpdp482PWnTUiucEA3dLEnlzajJ2VYDjvSrr9yl4ntfcFwQxZoU9_1ryfVQbDrjKe7flw931w_ze8mi8fb-3mzmDhJ1TDBWkCreBDU8VYJhyA1g9aD5DpwVlvJAjCAumZy1kqnpArUI3CqZUGcOK7uR18f7cpsUvdu05eJtjO_i5hejU3l1DUaCZ47UEErjdLVVIFygYbApWulAlu8zkevTYofW8yDWcVtKl_Mhpc7lQKmZoUSI-VSzDlh-HuVUfMTihlDMT-hmF0oRXU2qjpE_FNoLQA4E998rYW4</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2736886185</pqid></control><display><type>article</type><title>A Method for Automatic Android Malware Detection Based on Static Analysis and Deep Learning</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Ibrahim, Mulhem ; Issa, Bayan ; Jasser, Muhammed Basheer</creator><creatorcontrib>Ibrahim, Mulhem ; Issa, Bayan ; Jasser, Muhammed Basheer</creatorcontrib><description>The computers nowadays are being replaced by the smartphones for the most of the internet users around the world, and Android is getting the most of the smartphone systems' market. This rise of the usage of smartphones generally, and the Android system specifically, leads to a strong need to effectively secure Android, as the malware developers are targeting it with sophisticated and obfuscated malware applications. Consequently, a lot of studies were performed to propose a robust method to detect and classify android malicious software (malware). Some of them were effective, some were not; with accuracy below 90%, and some of them are being outdated; using datasets that became old containing applications for old versions of Android that are rarely used today. In this paper, a new method is proposed by using static analysis and gathering as most useful features of android applications as possible, along with two new proposed features, and then passing them to a functional API deep learning model we made. This method was implemented on a new and classified android application dataset, using 14079 malware and benign samples in total, with malware samples classified into four malware classes. Two major experiments with this dataset were implemented, one for malware detection with the dataset samples categorized into two classes as just malware and benign, the second one was made for malware detection and classification, using all the five classes of the dataset. As a result, our model overcomes the related works when using just two classes with F1-score of 99.5%. Also, high malware detection and classification performance was obtained by using the five classes, with F1-score of 97%.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2022.3219047</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Android ; Androids ; Classification ; Codes ; Datasets ; Deep learning ; Feature extraction ; Machine learning ; Malware ; Mobile operating systems ; Mobile Security ; Operating systems ; Smart phones ; Smartphones ; Static analysis</subject><ispartof>IEEE access, 2022, Vol.10, p.1-1</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c408t-e736b82f30c2b83ce64916bd6429f217a41f616677145b4c848f0de62094429c3</citedby><cites>FETCH-LOGICAL-c408t-e736b82f30c2b83ce64916bd6429f217a41f616677145b4c848f0de62094429c3</cites><orcidid>0000-0001-5292-465X ; 0000-0002-7559-3416 ; 0000-0002-6285-1500</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9936621$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,864,2102,4024,27633,27923,27924,27925,54933</link.rule.ids></links><search><creatorcontrib>Ibrahim, Mulhem</creatorcontrib><creatorcontrib>Issa, Bayan</creatorcontrib><creatorcontrib>Jasser, Muhammed Basheer</creatorcontrib><title>A Method for Automatic Android Malware Detection Based on Static Analysis and Deep Learning</title><title>IEEE access</title><addtitle>Access</addtitle><description>The computers nowadays are being replaced by the smartphones for the most of the internet users around the world, and Android is getting the most of the smartphone systems' market. This rise of the usage of smartphones generally, and the Android system specifically, leads to a strong need to effectively secure Android, as the malware developers are targeting it with sophisticated and obfuscated malware applications. Consequently, a lot of studies were performed to propose a robust method to detect and classify android malicious software (malware). Some of them were effective, some were not; with accuracy below 90%, and some of them are being outdated; using datasets that became old containing applications for old versions of Android that are rarely used today. In this paper, a new method is proposed by using static analysis and gathering as most useful features of android applications as possible, along with two new proposed features, and then passing them to a functional API deep learning model we made. This method was implemented on a new and classified android application dataset, using 14079 malware and benign samples in total, with malware samples classified into four malware classes. Two major experiments with this dataset were implemented, one for malware detection with the dataset samples categorized into two classes as just malware and benign, the second one was made for malware detection and classification, using all the five classes of the dataset. As a result, our model overcomes the related works when using just two classes with F1-score of 99.5%. Also, high malware detection and classification performance was obtained by using the five classes, with F1-score of 97%.</description><subject>Android</subject><subject>Androids</subject><subject>Classification</subject><subject>Codes</subject><subject>Datasets</subject><subject>Deep learning</subject><subject>Feature extraction</subject><subject>Machine learning</subject><subject>Malware</subject><subject>Mobile operating systems</subject><subject>Mobile Security</subject><subject>Operating systems</subject><subject>Smart phones</subject><subject>Smartphones</subject><subject>Static analysis</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNkU1LAzEQhhdRUNRf4CXguTVfnU2Oa_2EiofqyUPIJhPdUjc12SL-e6NbxLnMMDzvmwlvVZ0xOmWM6otmPr9eLqeccj4VnGkq673qiDPQEzETsP9vPqxOc17RUqqsZvVR9dKQBxzeoichJtJsh_huh86Rpvcpdp482PWnTUiucEA3dLEnlzajJ2VYDjvSrr9yl4ntfcFwQxZoU9_1ryfVQbDrjKe7flw931w_ze8mi8fb-3mzmDhJ1TDBWkCreBDU8VYJhyA1g9aD5DpwVlvJAjCAumZy1kqnpArUI3CqZUGcOK7uR18f7cpsUvdu05eJtjO_i5hejU3l1DUaCZ47UEErjdLVVIFygYbApWulAlu8zkevTYofW8yDWcVtKl_Mhpc7lQKmZoUSI-VSzDlh-HuVUfMTihlDMT-hmF0oRXU2qjpE_FNoLQA4E998rYW4</recordid><startdate>2022</startdate><enddate>2022</enddate><creator>Ibrahim, Mulhem</creator><creator>Issa, Bayan</creator><creator>Jasser, Muhammed Basheer</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0001-5292-465X</orcidid><orcidid>https://orcid.org/0000-0002-7559-3416</orcidid><orcidid>https://orcid.org/0000-0002-6285-1500</orcidid></search><sort><creationdate>2022</creationdate><title>A Method for Automatic Android Malware Detection Based on Static Analysis and Deep Learning</title><author>Ibrahim, Mulhem ; Issa, Bayan ; Jasser, Muhammed Basheer</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c408t-e736b82f30c2b83ce64916bd6429f217a41f616677145b4c848f0de62094429c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Android</topic><topic>Androids</topic><topic>Classification</topic><topic>Codes</topic><topic>Datasets</topic><topic>Deep learning</topic><topic>Feature extraction</topic><topic>Machine learning</topic><topic>Malware</topic><topic>Mobile operating systems</topic><topic>Mobile Security</topic><topic>Operating systems</topic><topic>Smart phones</topic><topic>Smartphones</topic><topic>Static analysis</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ibrahim, Mulhem</creatorcontrib><creatorcontrib>Issa, Bayan</creatorcontrib><creatorcontrib>Jasser, Muhammed Basheer</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ibrahim, Mulhem</au><au>Issa, Bayan</au><au>Jasser, Muhammed Basheer</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Method for Automatic Android Malware Detection Based on Static Analysis and Deep Learning</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2022</date><risdate>2022</risdate><volume>10</volume><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>The computers nowadays are being replaced by the smartphones for the most of the internet users around the world, and Android is getting the most of the smartphone systems' market. This rise of the usage of smartphones generally, and the Android system specifically, leads to a strong need to effectively secure Android, as the malware developers are targeting it with sophisticated and obfuscated malware applications. Consequently, a lot of studies were performed to propose a robust method to detect and classify android malicious software (malware). Some of them were effective, some were not; with accuracy below 90%, and some of them are being outdated; using datasets that became old containing applications for old versions of Android that are rarely used today. In this paper, a new method is proposed by using static analysis and gathering as most useful features of android applications as possible, along with two new proposed features, and then passing them to a functional API deep learning model we made. This method was implemented on a new and classified android application dataset, using 14079 malware and benign samples in total, with malware samples classified into four malware classes. Two major experiments with this dataset were implemented, one for malware detection with the dataset samples categorized into two classes as just malware and benign, the second one was made for malware detection and classification, using all the five classes of the dataset. As a result, our model overcomes the related works when using just two classes with F1-score of 99.5%. Also, high malware detection and classification performance was obtained by using the five classes, with F1-score of 97%.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2022.3219047</doi><tpages>1</tpages><orcidid>https://orcid.org/0000-0001-5292-465X</orcidid><orcidid>https://orcid.org/0000-0002-7559-3416</orcidid><orcidid>https://orcid.org/0000-0002-6285-1500</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2169-3536 |
ispartof | IEEE access, 2022, Vol.10, p.1-1 |
issn | 2169-3536 2169-3536 |
language | eng |
recordid | cdi_crossref_primary_10_1109_ACCESS_2022_3219047 |
source | IEEE Open Access Journals; DOAJ Directory of Open Access Journals; EZB-FREE-00999 freely available EZB journals |
subjects | Android Androids Classification Codes Datasets Deep learning Feature extraction Machine learning Malware Mobile operating systems Mobile Security Operating systems Smart phones Smartphones Static analysis |
title | A Method for Automatic Android Malware Detection Based on Static Analysis and Deep Learning |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T17%3A25%3A54IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Method%20for%20Automatic%20Android%20Malware%20Detection%20Based%20on%20Static%20Analysis%20and%20Deep%20Learning&rft.jtitle=IEEE%20access&rft.au=Ibrahim,%20Mulhem&rft.date=2022&rft.volume=10&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2022.3219047&rft_dat=%3Cproquest_cross%3E2736886185%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2736886185&rft_id=info:pmid/&rft_ieee_id=9936621&rft_doaj_id=oai_doaj_org_article_46d2c68f989e4c70868cf0ff24cb486a&rfr_iscdi=true |