Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models

Malware analysis and detection over the Android have been the focus of considerable research, during recent years, as customer adoption of Android attracted a corresponding number of malware writers. Antivirus companies commonly rely on signatures and are error‐prone. Traditional machine learning te...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Expert systems 2021-06, Vol.38 (4), p.n/a
Hauptverfasser: Jan, Salman, Musa, Shahrulniza, Ali, Toqeer, Nauman, Mohammad, Anwar, Sajid, Ali Tanveer, Tamleek, Shah, Babar
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page n/a
container_issue 4
container_start_page
container_title Expert systems
container_volume 38
creator Jan, Salman
Musa, Shahrulniza
Ali, Toqeer
Nauman, Mohammad
Anwar, Sajid
Ali Tanveer, Tamleek
Shah, Babar
description Malware analysis and detection over the Android have been the focus of considerable research, during recent years, as customer adoption of Android attracted a corresponding number of malware writers. Antivirus companies commonly rely on signatures and are error‐prone. Traditional machine learning techniques are based on static, dynamic, and hybrid analysis; however, for large scale Android malware analysis, these approaches are not feasible. Deep neural architectures are able to analyze large scale static details of the applications, but static analysis techniques can ignore many malicious behaviors of applications. The study contributes to the documentation of various approaches for detection of malware, traditional and state‐of‐the‐art models, developed for analysis that facilitates the provision of basic insights for researchers working in malware analysis, and the study also provides a dynamic approach that employs deep neural network models for detection of malware. Moreover, the study uses Android permissions as a parameter to measure the dynamic behavior of around 16,900 benign and intruded applications. A dataset is created which encompasses a large set of permissions‐based dynamic behavior pertaining applications, with an aim to train deep learning models for prediction of behavior. The proposed architecture extracts representations from input sequence data with no human intervention. The state‐of‐the‐art Deep Convolutional Generative Adversarial Network extracted deep features and accomplished a general validation accuracy of 97.08% with an F1‐score of 0.973 in correctly classifying input. Furthermore, the concept of blockchain is utilized to preserve the integrity of the dataset and the results of the analysis.
doi_str_mv 10.1111/exsy.12611
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2532446606</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2532446606</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2161-68186576c8e8afad27655a65f1004a0fc26ea1b9b7055f46f7625ee9c8290c223</originalsourceid><addsrcrecordid>eNp9kEFLw0AQhRdRsFYv_oIFb0Lq7jaZpEcpVQuFHqqgpzDdzKZb0yTuptX8CP-zaSt4cy5zeN-bxzzGrqUYyG7u6Mu3A6lAyhPWkyEkgRiOwlPWEwogCGMlztmF92shhIxj6LHvadlQ7mzT8h05a6zGxlYlxzLjS1rhzlYOC64L9P5PrQxHXqDLiWfYoKeGY10Xv7LnNbkGbWnLnPsNuobPF3xnkS-LSr_rVScdAnIqyXWWHfFNlVHhL9mZwcLT1e_us5eHyfP4KZjNH6fj-1mglQQZQCITiGLQCSVoMFMxRBFCZKQQIQqjFRDK5WgZiygyIZgYVEQ00okaCa3UsM9ujndrV31syTfputq6sotMVTRUYQggoKNuj5R2lfeOTFo7273TplKk-7rTfd3poe4Olkf40xbU_kOmk9fF29HzAwHFhUg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2532446606</pqid></control><display><type>article</type><title>Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models</title><source>Wiley Online Library Journals Frontfile Complete</source><source>EBSCOhost Business Source Complete</source><creator>Jan, Salman ; Musa, Shahrulniza ; Ali, Toqeer ; Nauman, Mohammad ; Anwar, Sajid ; Ali Tanveer, Tamleek ; Shah, Babar</creator><creatorcontrib>Jan, Salman ; Musa, Shahrulniza ; Ali, Toqeer ; Nauman, Mohammad ; Anwar, Sajid ; Ali Tanveer, Tamleek ; Shah, Babar</creatorcontrib><description>Malware analysis and detection over the Android have been the focus of considerable research, during recent years, as customer adoption of Android attracted a corresponding number of malware writers. Antivirus companies commonly rely on signatures and are error‐prone. Traditional machine learning techniques are based on static, dynamic, and hybrid analysis; however, for large scale Android malware analysis, these approaches are not feasible. Deep neural architectures are able to analyze large scale static details of the applications, but static analysis techniques can ignore many malicious behaviors of applications. The study contributes to the documentation of various approaches for detection of malware, traditional and state‐of‐the‐art models, developed for analysis that facilitates the provision of basic insights for researchers working in malware analysis, and the study also provides a dynamic approach that employs deep neural network models for detection of malware. Moreover, the study uses Android permissions as a parameter to measure the dynamic behavior of around 16,900 benign and intruded applications. A dataset is created which encompasses a large set of permissions‐based dynamic behavior pertaining applications, with an aim to train deep learning models for prediction of behavior. The proposed architecture extracts representations from input sequence data with no human intervention. The state‐of‐the‐art Deep Convolutional Generative Adversarial Network extracted deep features and accomplished a general validation accuracy of 97.08% with an F1‐score of 0.973 in correctly classifying input. Furthermore, the concept of blockchain is utilized to preserve the integrity of the dataset and the results of the analysis.</description><identifier>ISSN: 0266-4720</identifier><identifier>EISSN: 1468-0394</identifier><identifier>DOI: 10.1111/exsy.12611</identifier><language>eng</language><publisher>Oxford: Blackwell Publishing Ltd</publisher><subject>android security ; Anti-virus software ; Artificial neural networks ; Blockchain ; Classification ; Cryptography ; Datasets ; DCGAN ; deep learning ; Feature extraction ; Generative adversarial networks ; Integrity ; Machine learning ; Malware ; malware detection</subject><ispartof>Expert systems, 2021-06, Vol.38 (4), p.n/a</ispartof><rights>2020 John Wiley &amp; Sons, Ltd</rights><rights>2021 John Wiley &amp; Sons, Ltd</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c2161-68186576c8e8afad27655a65f1004a0fc26ea1b9b7055f46f7625ee9c8290c223</citedby><cites>FETCH-LOGICAL-c2161-68186576c8e8afad27655a65f1004a0fc26ea1b9b7055f46f7625ee9c8290c223</cites><orcidid>0000-0002-8250-694X ; 0000-0002-5731-6650</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://onlinelibrary.wiley.com/doi/pdf/10.1111%2Fexsy.12611$$EPDF$$P50$$Gwiley$$H</linktopdf><linktohtml>$$Uhttps://onlinelibrary.wiley.com/doi/full/10.1111%2Fexsy.12611$$EHTML$$P50$$Gwiley$$H</linktohtml><link.rule.ids>314,776,780,1411,27901,27902,45550,45551</link.rule.ids></links><search><creatorcontrib>Jan, Salman</creatorcontrib><creatorcontrib>Musa, Shahrulniza</creatorcontrib><creatorcontrib>Ali, Toqeer</creatorcontrib><creatorcontrib>Nauman, Mohammad</creatorcontrib><creatorcontrib>Anwar, Sajid</creatorcontrib><creatorcontrib>Ali Tanveer, Tamleek</creatorcontrib><creatorcontrib>Shah, Babar</creatorcontrib><title>Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models</title><title>Expert systems</title><description>Malware analysis and detection over the Android have been the focus of considerable research, during recent years, as customer adoption of Android attracted a corresponding number of malware writers. Antivirus companies commonly rely on signatures and are error‐prone. Traditional machine learning techniques are based on static, dynamic, and hybrid analysis; however, for large scale Android malware analysis, these approaches are not feasible. Deep neural architectures are able to analyze large scale static details of the applications, but static analysis techniques can ignore many malicious behaviors of applications. The study contributes to the documentation of various approaches for detection of malware, traditional and state‐of‐the‐art models, developed for analysis that facilitates the provision of basic insights for researchers working in malware analysis, and the study also provides a dynamic approach that employs deep neural network models for detection of malware. Moreover, the study uses Android permissions as a parameter to measure the dynamic behavior of around 16,900 benign and intruded applications. A dataset is created which encompasses a large set of permissions‐based dynamic behavior pertaining applications, with an aim to train deep learning models for prediction of behavior. The proposed architecture extracts representations from input sequence data with no human intervention. The state‐of‐the‐art Deep Convolutional Generative Adversarial Network extracted deep features and accomplished a general validation accuracy of 97.08% with an F1‐score of 0.973 in correctly classifying input. Furthermore, the concept of blockchain is utilized to preserve the integrity of the dataset and the results of the analysis.</description><subject>android security</subject><subject>Anti-virus software</subject><subject>Artificial neural networks</subject><subject>Blockchain</subject><subject>Classification</subject><subject>Cryptography</subject><subject>Datasets</subject><subject>DCGAN</subject><subject>deep learning</subject><subject>Feature extraction</subject><subject>Generative adversarial networks</subject><subject>Integrity</subject><subject>Machine learning</subject><subject>Malware</subject><subject>malware detection</subject><issn>0266-4720</issn><issn>1468-0394</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNp9kEFLw0AQhRdRsFYv_oIFb0Lq7jaZpEcpVQuFHqqgpzDdzKZb0yTuptX8CP-zaSt4cy5zeN-bxzzGrqUYyG7u6Mu3A6lAyhPWkyEkgRiOwlPWEwogCGMlztmF92shhIxj6LHvadlQ7mzT8h05a6zGxlYlxzLjS1rhzlYOC64L9P5PrQxHXqDLiWfYoKeGY10Xv7LnNbkGbWnLnPsNuobPF3xnkS-LSr_rVScdAnIqyXWWHfFNlVHhL9mZwcLT1e_us5eHyfP4KZjNH6fj-1mglQQZQCITiGLQCSVoMFMxRBFCZKQQIQqjFRDK5WgZiygyIZgYVEQ00okaCa3UsM9ujndrV31syTfputq6sotMVTRUYQggoKNuj5R2lfeOTFo7273TplKk-7rTfd3poe4Olkf40xbU_kOmk9fF29HzAwHFhUg</recordid><startdate>202106</startdate><enddate>202106</enddate><creator>Jan, Salman</creator><creator>Musa, Shahrulniza</creator><creator>Ali, Toqeer</creator><creator>Nauman, Mohammad</creator><creator>Anwar, Sajid</creator><creator>Ali Tanveer, Tamleek</creator><creator>Shah, Babar</creator><general>Blackwell Publishing Ltd</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7TB</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-8250-694X</orcidid><orcidid>https://orcid.org/0000-0002-5731-6650</orcidid></search><sort><creationdate>202106</creationdate><title>Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models</title><author>Jan, Salman ; Musa, Shahrulniza ; Ali, Toqeer ; Nauman, Mohammad ; Anwar, Sajid ; Ali Tanveer, Tamleek ; Shah, Babar</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2161-68186576c8e8afad27655a65f1004a0fc26ea1b9b7055f46f7625ee9c8290c223</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>android security</topic><topic>Anti-virus software</topic><topic>Artificial neural networks</topic><topic>Blockchain</topic><topic>Classification</topic><topic>Cryptography</topic><topic>Datasets</topic><topic>DCGAN</topic><topic>deep learning</topic><topic>Feature extraction</topic><topic>Generative adversarial networks</topic><topic>Integrity</topic><topic>Machine learning</topic><topic>Malware</topic><topic>malware detection</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Jan, Salman</creatorcontrib><creatorcontrib>Musa, Shahrulniza</creatorcontrib><creatorcontrib>Ali, Toqeer</creatorcontrib><creatorcontrib>Nauman, Mohammad</creatorcontrib><creatorcontrib>Anwar, Sajid</creatorcontrib><creatorcontrib>Ali Tanveer, Tamleek</creatorcontrib><creatorcontrib>Shah, Babar</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Expert systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Jan, Salman</au><au>Musa, Shahrulniza</au><au>Ali, Toqeer</au><au>Nauman, Mohammad</au><au>Anwar, Sajid</au><au>Ali Tanveer, Tamleek</au><au>Shah, Babar</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models</atitle><jtitle>Expert systems</jtitle><date>2021-06</date><risdate>2021</risdate><volume>38</volume><issue>4</issue><epage>n/a</epage><issn>0266-4720</issn><eissn>1468-0394</eissn><abstract>Malware analysis and detection over the Android have been the focus of considerable research, during recent years, as customer adoption of Android attracted a corresponding number of malware writers. Antivirus companies commonly rely on signatures and are error‐prone. Traditional machine learning techniques are based on static, dynamic, and hybrid analysis; however, for large scale Android malware analysis, these approaches are not feasible. Deep neural architectures are able to analyze large scale static details of the applications, but static analysis techniques can ignore many malicious behaviors of applications. The study contributes to the documentation of various approaches for detection of malware, traditional and state‐of‐the‐art models, developed for analysis that facilitates the provision of basic insights for researchers working in malware analysis, and the study also provides a dynamic approach that employs deep neural network models for detection of malware. Moreover, the study uses Android permissions as a parameter to measure the dynamic behavior of around 16,900 benign and intruded applications. A dataset is created which encompasses a large set of permissions‐based dynamic behavior pertaining applications, with an aim to train deep learning models for prediction of behavior. The proposed architecture extracts representations from input sequence data with no human intervention. The state‐of‐the‐art Deep Convolutional Generative Adversarial Network extracted deep features and accomplished a general validation accuracy of 97.08% with an F1‐score of 0.973 in correctly classifying input. Furthermore, the concept of blockchain is utilized to preserve the integrity of the dataset and the results of the analysis.</abstract><cop>Oxford</cop><pub>Blackwell Publishing Ltd</pub><doi>10.1111/exsy.12611</doi><tpages>19</tpages><orcidid>https://orcid.org/0000-0002-8250-694X</orcidid><orcidid>https://orcid.org/0000-0002-5731-6650</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 0266-4720
ispartof Expert systems, 2021-06, Vol.38 (4), p.n/a
issn 0266-4720
1468-0394
language eng
recordid cdi_proquest_journals_2532446606
source Wiley Online Library Journals Frontfile Complete; EBSCOhost Business Source Complete
subjects android security
Anti-virus software
Artificial neural networks
Blockchain
Classification
Cryptography
Datasets
DCGAN
deep learning
Feature extraction
Generative adversarial networks
Integrity
Machine learning
Malware
malware detection
title Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-18T11%3A24%3A29IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Integrity%20verification%20and%20behavioral%20classification%20of%20a%20large%20dataset%20applications%20pertaining%20smart%20OS%20via%20blockchain%20and%20generative%20models&rft.jtitle=Expert%20systems&rft.au=Jan,%20Salman&rft.date=2021-06&rft.volume=38&rft.issue=4&rft.epage=n/a&rft.issn=0266-4720&rft.eissn=1468-0394&rft_id=info:doi/10.1111/exsy.12611&rft_dat=%3Cproquest_cross%3E2532446606%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2532446606&rft_id=info:pmid/&rfr_iscdi=true