Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models
Malware analysis and detection over the Android have been the focus of considerable research, during recent years, as customer adoption of Android attracted a corresponding number of malware writers. Antivirus companies commonly rely on signatures and are error‐prone. Traditional machine learning te...
Gespeichert in:
Veröffentlicht in: | Expert systems 2021-06, Vol.38 (4), p.n/a |
---|---|
Hauptverfasser: | , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | n/a |
---|---|
container_issue | 4 |
container_start_page | |
container_title | Expert systems |
container_volume | 38 |
creator | Jan, Salman Musa, Shahrulniza Ali, Toqeer Nauman, Mohammad Anwar, Sajid Ali Tanveer, Tamleek Shah, Babar |
description | Malware analysis and detection over the Android have been the focus of considerable research, during recent years, as customer adoption of Android attracted a corresponding number of malware writers. Antivirus companies commonly rely on signatures and are error‐prone. Traditional machine learning techniques are based on static, dynamic, and hybrid analysis; however, for large scale Android malware analysis, these approaches are not feasible. Deep neural architectures are able to analyze large scale static details of the applications, but static analysis techniques can ignore many malicious behaviors of applications. The study contributes to the documentation of various approaches for detection of malware, traditional and state‐of‐the‐art models, developed for analysis that facilitates the provision of basic insights for researchers working in malware analysis, and the study also provides a dynamic approach that employs deep neural network models for detection of malware. Moreover, the study uses Android permissions as a parameter to measure the dynamic behavior of around 16,900 benign and intruded applications. A dataset is created which encompasses a large set of permissions‐based dynamic behavior pertaining applications, with an aim to train deep learning models for prediction of behavior. The proposed architecture extracts representations from input sequence data with no human intervention. The state‐of‐the‐art Deep Convolutional Generative Adversarial Network extracted deep features and accomplished a general validation accuracy of 97.08% with an F1‐score of 0.973 in correctly classifying input. Furthermore, the concept of blockchain is utilized to preserve the integrity of the dataset and the results of the analysis. |
doi_str_mv | 10.1111/exsy.12611 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2532446606</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2532446606</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2161-68186576c8e8afad27655a65f1004a0fc26ea1b9b7055f46f7625ee9c8290c223</originalsourceid><addsrcrecordid>eNp9kEFLw0AQhRdRsFYv_oIFb0Lq7jaZpEcpVQuFHqqgpzDdzKZb0yTuptX8CP-zaSt4cy5zeN-bxzzGrqUYyG7u6Mu3A6lAyhPWkyEkgRiOwlPWEwogCGMlztmF92shhIxj6LHvadlQ7mzT8h05a6zGxlYlxzLjS1rhzlYOC64L9P5PrQxHXqDLiWfYoKeGY10Xv7LnNbkGbWnLnPsNuobPF3xnkS-LSr_rVScdAnIqyXWWHfFNlVHhL9mZwcLT1e_us5eHyfP4KZjNH6fj-1mglQQZQCITiGLQCSVoMFMxRBFCZKQQIQqjFRDK5WgZiygyIZgYVEQ00okaCa3UsM9ujndrV31syTfputq6sotMVTRUYQggoKNuj5R2lfeOTFo7273TplKk-7rTfd3poe4Olkf40xbU_kOmk9fF29HzAwHFhUg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2532446606</pqid></control><display><type>article</type><title>Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models</title><source>Wiley Online Library Journals Frontfile Complete</source><source>EBSCOhost Business Source Complete</source><creator>Jan, Salman ; Musa, Shahrulniza ; Ali, Toqeer ; Nauman, Mohammad ; Anwar, Sajid ; Ali Tanveer, Tamleek ; Shah, Babar</creator><creatorcontrib>Jan, Salman ; Musa, Shahrulniza ; Ali, Toqeer ; Nauman, Mohammad ; Anwar, Sajid ; Ali Tanveer, Tamleek ; Shah, Babar</creatorcontrib><description>Malware analysis and detection over the Android have been the focus of considerable research, during recent years, as customer adoption of Android attracted a corresponding number of malware writers. Antivirus companies commonly rely on signatures and are error‐prone. Traditional machine learning techniques are based on static, dynamic, and hybrid analysis; however, for large scale Android malware analysis, these approaches are not feasible. Deep neural architectures are able to analyze large scale static details of the applications, but static analysis techniques can ignore many malicious behaviors of applications. The study contributes to the documentation of various approaches for detection of malware, traditional and state‐of‐the‐art models, developed for analysis that facilitates the provision of basic insights for researchers working in malware analysis, and the study also provides a dynamic approach that employs deep neural network models for detection of malware. Moreover, the study uses Android permissions as a parameter to measure the dynamic behavior of around 16,900 benign and intruded applications. A dataset is created which encompasses a large set of permissions‐based dynamic behavior pertaining applications, with an aim to train deep learning models for prediction of behavior. The proposed architecture extracts representations from input sequence data with no human intervention. The state‐of‐the‐art Deep Convolutional Generative Adversarial Network extracted deep features and accomplished a general validation accuracy of 97.08% with an F1‐score of 0.973 in correctly classifying input. Furthermore, the concept of blockchain is utilized to preserve the integrity of the dataset and the results of the analysis.</description><identifier>ISSN: 0266-4720</identifier><identifier>EISSN: 1468-0394</identifier><identifier>DOI: 10.1111/exsy.12611</identifier><language>eng</language><publisher>Oxford: Blackwell Publishing Ltd</publisher><subject>android security ; Anti-virus software ; Artificial neural networks ; Blockchain ; Classification ; Cryptography ; Datasets ; DCGAN ; deep learning ; Feature extraction ; Generative adversarial networks ; Integrity ; Machine learning ; Malware ; malware detection</subject><ispartof>Expert systems, 2021-06, Vol.38 (4), p.n/a</ispartof><rights>2020 John Wiley & Sons, Ltd</rights><rights>2021 John Wiley & Sons, Ltd</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c2161-68186576c8e8afad27655a65f1004a0fc26ea1b9b7055f46f7625ee9c8290c223</citedby><cites>FETCH-LOGICAL-c2161-68186576c8e8afad27655a65f1004a0fc26ea1b9b7055f46f7625ee9c8290c223</cites><orcidid>0000-0002-8250-694X ; 0000-0002-5731-6650</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://onlinelibrary.wiley.com/doi/pdf/10.1111%2Fexsy.12611$$EPDF$$P50$$Gwiley$$H</linktopdf><linktohtml>$$Uhttps://onlinelibrary.wiley.com/doi/full/10.1111%2Fexsy.12611$$EHTML$$P50$$Gwiley$$H</linktohtml><link.rule.ids>314,776,780,1411,27901,27902,45550,45551</link.rule.ids></links><search><creatorcontrib>Jan, Salman</creatorcontrib><creatorcontrib>Musa, Shahrulniza</creatorcontrib><creatorcontrib>Ali, Toqeer</creatorcontrib><creatorcontrib>Nauman, Mohammad</creatorcontrib><creatorcontrib>Anwar, Sajid</creatorcontrib><creatorcontrib>Ali Tanveer, Tamleek</creatorcontrib><creatorcontrib>Shah, Babar</creatorcontrib><title>Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models</title><title>Expert systems</title><description>Malware analysis and detection over the Android have been the focus of considerable research, during recent years, as customer adoption of Android attracted a corresponding number of malware writers. Antivirus companies commonly rely on signatures and are error‐prone. Traditional machine learning techniques are based on static, dynamic, and hybrid analysis; however, for large scale Android malware analysis, these approaches are not feasible. Deep neural architectures are able to analyze large scale static details of the applications, but static analysis techniques can ignore many malicious behaviors of applications. The study contributes to the documentation of various approaches for detection of malware, traditional and state‐of‐the‐art models, developed for analysis that facilitates the provision of basic insights for researchers working in malware analysis, and the study also provides a dynamic approach that employs deep neural network models for detection of malware. Moreover, the study uses Android permissions as a parameter to measure the dynamic behavior of around 16,900 benign and intruded applications. A dataset is created which encompasses a large set of permissions‐based dynamic behavior pertaining applications, with an aim to train deep learning models for prediction of behavior. The proposed architecture extracts representations from input sequence data with no human intervention. The state‐of‐the‐art Deep Convolutional Generative Adversarial Network extracted deep features and accomplished a general validation accuracy of 97.08% with an F1‐score of 0.973 in correctly classifying input. Furthermore, the concept of blockchain is utilized to preserve the integrity of the dataset and the results of the analysis.</description><subject>android security</subject><subject>Anti-virus software</subject><subject>Artificial neural networks</subject><subject>Blockchain</subject><subject>Classification</subject><subject>Cryptography</subject><subject>Datasets</subject><subject>DCGAN</subject><subject>deep learning</subject><subject>Feature extraction</subject><subject>Generative adversarial networks</subject><subject>Integrity</subject><subject>Machine learning</subject><subject>Malware</subject><subject>malware detection</subject><issn>0266-4720</issn><issn>1468-0394</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNp9kEFLw0AQhRdRsFYv_oIFb0Lq7jaZpEcpVQuFHqqgpzDdzKZb0yTuptX8CP-zaSt4cy5zeN-bxzzGrqUYyG7u6Mu3A6lAyhPWkyEkgRiOwlPWEwogCGMlztmF92shhIxj6LHvadlQ7mzT8h05a6zGxlYlxzLjS1rhzlYOC64L9P5PrQxHXqDLiWfYoKeGY10Xv7LnNbkGbWnLnPsNuobPF3xnkS-LSr_rVScdAnIqyXWWHfFNlVHhL9mZwcLT1e_us5eHyfP4KZjNH6fj-1mglQQZQCITiGLQCSVoMFMxRBFCZKQQIQqjFRDK5WgZiygyIZgYVEQ00okaCa3UsM9ujndrV31syTfputq6sotMVTRUYQggoKNuj5R2lfeOTFo7273TplKk-7rTfd3poe4Olkf40xbU_kOmk9fF29HzAwHFhUg</recordid><startdate>202106</startdate><enddate>202106</enddate><creator>Jan, Salman</creator><creator>Musa, Shahrulniza</creator><creator>Ali, Toqeer</creator><creator>Nauman, Mohammad</creator><creator>Anwar, Sajid</creator><creator>Ali Tanveer, Tamleek</creator><creator>Shah, Babar</creator><general>Blackwell Publishing Ltd</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7TB</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-8250-694X</orcidid><orcidid>https://orcid.org/0000-0002-5731-6650</orcidid></search><sort><creationdate>202106</creationdate><title>Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models</title><author>Jan, Salman ; Musa, Shahrulniza ; Ali, Toqeer ; Nauman, Mohammad ; Anwar, Sajid ; Ali Tanveer, Tamleek ; Shah, Babar</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2161-68186576c8e8afad27655a65f1004a0fc26ea1b9b7055f46f7625ee9c8290c223</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>android security</topic><topic>Anti-virus software</topic><topic>Artificial neural networks</topic><topic>Blockchain</topic><topic>Classification</topic><topic>Cryptography</topic><topic>Datasets</topic><topic>DCGAN</topic><topic>deep learning</topic><topic>Feature extraction</topic><topic>Generative adversarial networks</topic><topic>Integrity</topic><topic>Machine learning</topic><topic>Malware</topic><topic>malware detection</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Jan, Salman</creatorcontrib><creatorcontrib>Musa, Shahrulniza</creatorcontrib><creatorcontrib>Ali, Toqeer</creatorcontrib><creatorcontrib>Nauman, Mohammad</creatorcontrib><creatorcontrib>Anwar, Sajid</creatorcontrib><creatorcontrib>Ali Tanveer, Tamleek</creatorcontrib><creatorcontrib>Shah, Babar</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Expert systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Jan, Salman</au><au>Musa, Shahrulniza</au><au>Ali, Toqeer</au><au>Nauman, Mohammad</au><au>Anwar, Sajid</au><au>Ali Tanveer, Tamleek</au><au>Shah, Babar</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models</atitle><jtitle>Expert systems</jtitle><date>2021-06</date><risdate>2021</risdate><volume>38</volume><issue>4</issue><epage>n/a</epage><issn>0266-4720</issn><eissn>1468-0394</eissn><abstract>Malware analysis and detection over the Android have been the focus of considerable research, during recent years, as customer adoption of Android attracted a corresponding number of malware writers. Antivirus companies commonly rely on signatures and are error‐prone. Traditional machine learning techniques are based on static, dynamic, and hybrid analysis; however, for large scale Android malware analysis, these approaches are not feasible. Deep neural architectures are able to analyze large scale static details of the applications, but static analysis techniques can ignore many malicious behaviors of applications. The study contributes to the documentation of various approaches for detection of malware, traditional and state‐of‐the‐art models, developed for analysis that facilitates the provision of basic insights for researchers working in malware analysis, and the study also provides a dynamic approach that employs deep neural network models for detection of malware. Moreover, the study uses Android permissions as a parameter to measure the dynamic behavior of around 16,900 benign and intruded applications. A dataset is created which encompasses a large set of permissions‐based dynamic behavior pertaining applications, with an aim to train deep learning models for prediction of behavior. The proposed architecture extracts representations from input sequence data with no human intervention. The state‐of‐the‐art Deep Convolutional Generative Adversarial Network extracted deep features and accomplished a general validation accuracy of 97.08% with an F1‐score of 0.973 in correctly classifying input. Furthermore, the concept of blockchain is utilized to preserve the integrity of the dataset and the results of the analysis.</abstract><cop>Oxford</cop><pub>Blackwell Publishing Ltd</pub><doi>10.1111/exsy.12611</doi><tpages>19</tpages><orcidid>https://orcid.org/0000-0002-8250-694X</orcidid><orcidid>https://orcid.org/0000-0002-5731-6650</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0266-4720 |
ispartof | Expert systems, 2021-06, Vol.38 (4), p.n/a |
issn | 0266-4720 1468-0394 |
language | eng |
recordid | cdi_proquest_journals_2532446606 |
source | Wiley Online Library Journals Frontfile Complete; EBSCOhost Business Source Complete |
subjects | android security Anti-virus software Artificial neural networks Blockchain Classification Cryptography Datasets DCGAN deep learning Feature extraction Generative adversarial networks Integrity Machine learning Malware malware detection |
title | Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-18T11%3A24%3A29IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Integrity%20verification%20and%20behavioral%20classification%20of%20a%20large%20dataset%20applications%20pertaining%20smart%20OS%20via%20blockchain%20and%20generative%20models&rft.jtitle=Expert%20systems&rft.au=Jan,%20Salman&rft.date=2021-06&rft.volume=38&rft.issue=4&rft.epage=n/a&rft.issn=0266-4720&rft.eissn=1468-0394&rft_id=info:doi/10.1111/exsy.12611&rft_dat=%3Cproquest_cross%3E2532446606%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2532446606&rft_id=info:pmid/&rfr_iscdi=true |