Permission Sensitivity-Based Malicious Application Detection for Android
Since a growing number of malicious applications attempt to steal users’ private data by illegally invoking permissions, application stores have carried out many malware detection methods based on application permissions. However, most of them ignore specific permission combinations and application...
Gespeichert in:
Veröffentlicht in: | Security and communication networks 2021, Vol.2021, p.1-12 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 12 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | Security and communication networks |
container_volume | 2021 |
creator | Song, Yubo Geng, Yijin Wang, Junbo Gao, Shang Shi, Wei |
description | Since a growing number of malicious applications attempt to steal users’ private data by illegally invoking permissions, application stores have carried out many malware detection methods based on application permissions. However, most of them ignore specific permission combinations and application categories that affect the detection accuracy. The features they extracted are neither representative enough to distinguish benign and malicious applications. For these problems, an Android malware detection method based on permission sensitivity is proposed. First, for each kind of application categories, the permission features and permission combination features are extracted. The sensitive permission feature set corresponding to each category label is then obtained by the feature selection method based on permission sensitivity. In the following step, the permission call situation of the application to be detected is compared with the sensitive permission feature set, and the weight allocation method is used to quantify this information into numerical features. In the proposed method of malicious application detection, three machine-learning algorithms are selected to construct the classifier model and optimize the parameters. Compared with traditional methods, the proposed method consumed 60.94% less time while still achieving high accuracy of up to 92.17%. |
doi_str_mv | 10.1155/2021/6689486 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2559338806</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2559338806</sourcerecordid><originalsourceid>FETCH-LOGICAL-c294t-2d089407ea8a79568d805b22dac98e1682e2166c39c59743f10fed3b8c946e8a3</originalsourceid><addsrcrecordid>eNp9kE1LAzEQQIMoWKs3f8CCR12b702OtX5UqCio55Ams5jSbtZkq_Tfu7XFo6d5h8fM8BA6J_iaECFGFFMyklJpruQBGhDNdIkJpYd_TPgxOsl5gbEkvOIDNH2BtAo5h9gUr9Dk0IWv0G3KG5vBF092GVyI61yM27ZH2229W-jA_VIdUzFufIrBn6Kj2i4znO3nEL3f371NpuXs-eFxMp6VjmreldTj_j1cgVW20kIqr7CYU-qt0wqIVBQokdIx7YSuOKsJrsGzuXKaS1CWDdHFbm-b4ucacmcWcZ2a_qShQmjGlMKyt652lksx5wS1aVNY2bQxBJttK7NtZfatev1yp3-Extvv8L_9AwTzaBo</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2559338806</pqid></control><display><type>article</type><title>Permission Sensitivity-Based Malicious Application Detection for Android</title><source>Wiley-Blackwell Open Access Titles</source><source>EZB-FREE-00999 freely available EZB journals</source><source>Alma/SFX Local Collection</source><creator>Song, Yubo ; Geng, Yijin ; Wang, Junbo ; Gao, Shang ; Shi, Wei</creator><contributor>Zhang, Liguo ; Liguo Zhang</contributor><creatorcontrib>Song, Yubo ; Geng, Yijin ; Wang, Junbo ; Gao, Shang ; Shi, Wei ; Zhang, Liguo ; Liguo Zhang</creatorcontrib><description>Since a growing number of malicious applications attempt to steal users’ private data by illegally invoking permissions, application stores have carried out many malware detection methods based on application permissions. However, most of them ignore specific permission combinations and application categories that affect the detection accuracy. The features they extracted are neither representative enough to distinguish benign and malicious applications. For these problems, an Android malware detection method based on permission sensitivity is proposed. First, for each kind of application categories, the permission features and permission combination features are extracted. The sensitive permission feature set corresponding to each category label is then obtained by the feature selection method based on permission sensitivity. In the following step, the permission call situation of the application to be detected is compared with the sensitive permission feature set, and the weight allocation method is used to quantify this information into numerical features. In the proposed method of malicious application detection, three machine-learning algorithms are selected to construct the classifier model and optimize the parameters. Compared with traditional methods, the proposed method consumed 60.94% less time while still achieving high accuracy of up to 92.17%.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2021/6689486</identifier><language>eng</language><publisher>London: Hindawi</publisher><subject>Accuracy ; Algorithms ; Automatic classification ; Behavior ; Datasets ; Feature extraction ; Machine learning ; Malware ; Methods ; Semantic analysis ; Semantics ; Sensitivity ; Software packages</subject><ispartof>Security and communication networks, 2021, Vol.2021, p.1-12</ispartof><rights>Copyright © 2021 Yubo Song et al.</rights><rights>Copyright © 2021 Yubo Song et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c294t-2d089407ea8a79568d805b22dac98e1682e2166c39c59743f10fed3b8c946e8a3</cites><orcidid>0000-0002-1347-6126</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,4024,27923,27924,27925</link.rule.ids></links><search><contributor>Zhang, Liguo</contributor><contributor>Liguo Zhang</contributor><creatorcontrib>Song, Yubo</creatorcontrib><creatorcontrib>Geng, Yijin</creatorcontrib><creatorcontrib>Wang, Junbo</creatorcontrib><creatorcontrib>Gao, Shang</creatorcontrib><creatorcontrib>Shi, Wei</creatorcontrib><title>Permission Sensitivity-Based Malicious Application Detection for Android</title><title>Security and communication networks</title><description>Since a growing number of malicious applications attempt to steal users’ private data by illegally invoking permissions, application stores have carried out many malware detection methods based on application permissions. However, most of them ignore specific permission combinations and application categories that affect the detection accuracy. The features they extracted are neither representative enough to distinguish benign and malicious applications. For these problems, an Android malware detection method based on permission sensitivity is proposed. First, for each kind of application categories, the permission features and permission combination features are extracted. The sensitive permission feature set corresponding to each category label is then obtained by the feature selection method based on permission sensitivity. In the following step, the permission call situation of the application to be detected is compared with the sensitive permission feature set, and the weight allocation method is used to quantify this information into numerical features. In the proposed method of malicious application detection, three machine-learning algorithms are selected to construct the classifier model and optimize the parameters. Compared with traditional methods, the proposed method consumed 60.94% less time while still achieving high accuracy of up to 92.17%.</description><subject>Accuracy</subject><subject>Algorithms</subject><subject>Automatic classification</subject><subject>Behavior</subject><subject>Datasets</subject><subject>Feature extraction</subject><subject>Machine learning</subject><subject>Malware</subject><subject>Methods</subject><subject>Semantic analysis</subject><subject>Semantics</subject><subject>Sensitivity</subject><subject>Software packages</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kE1LAzEQQIMoWKs3f8CCR12b702OtX5UqCio55Ams5jSbtZkq_Tfu7XFo6d5h8fM8BA6J_iaECFGFFMyklJpruQBGhDNdIkJpYd_TPgxOsl5gbEkvOIDNH2BtAo5h9gUr9Dk0IWv0G3KG5vBF092GVyI61yM27ZH2229W-jA_VIdUzFufIrBn6Kj2i4znO3nEL3f371NpuXs-eFxMp6VjmreldTj_j1cgVW20kIqr7CYU-qt0wqIVBQokdIx7YSuOKsJrsGzuXKaS1CWDdHFbm-b4ucacmcWcZ2a_qShQmjGlMKyt652lksx5wS1aVNY2bQxBJttK7NtZfatev1yp3-Extvv8L_9AwTzaBo</recordid><startdate>2021</startdate><enddate>2021</enddate><creator>Song, Yubo</creator><creator>Geng, Yijin</creator><creator>Wang, Junbo</creator><creator>Gao, Shang</creator><creator>Shi, Wei</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0002-1347-6126</orcidid></search><sort><creationdate>2021</creationdate><title>Permission Sensitivity-Based Malicious Application Detection for Android</title><author>Song, Yubo ; Geng, Yijin ; Wang, Junbo ; Gao, Shang ; Shi, Wei</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c294t-2d089407ea8a79568d805b22dac98e1682e2166c39c59743f10fed3b8c946e8a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Accuracy</topic><topic>Algorithms</topic><topic>Automatic classification</topic><topic>Behavior</topic><topic>Datasets</topic><topic>Feature extraction</topic><topic>Machine learning</topic><topic>Malware</topic><topic>Methods</topic><topic>Semantic analysis</topic><topic>Semantics</topic><topic>Sensitivity</topic><topic>Software packages</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Song, Yubo</creatorcontrib><creatorcontrib>Geng, Yijin</creatorcontrib><creatorcontrib>Wang, Junbo</creatorcontrib><creatorcontrib>Gao, Shang</creatorcontrib><creatorcontrib>Shi, Wei</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access Journals</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Song, Yubo</au><au>Geng, Yijin</au><au>Wang, Junbo</au><au>Gao, Shang</au><au>Shi, Wei</au><au>Zhang, Liguo</au><au>Liguo Zhang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Permission Sensitivity-Based Malicious Application Detection for Android</atitle><jtitle>Security and communication networks</jtitle><date>2021</date><risdate>2021</risdate><volume>2021</volume><spage>1</spage><epage>12</epage><pages>1-12</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>Since a growing number of malicious applications attempt to steal users’ private data by illegally invoking permissions, application stores have carried out many malware detection methods based on application permissions. However, most of them ignore specific permission combinations and application categories that affect the detection accuracy. The features they extracted are neither representative enough to distinguish benign and malicious applications. For these problems, an Android malware detection method based on permission sensitivity is proposed. First, for each kind of application categories, the permission features and permission combination features are extracted. The sensitive permission feature set corresponding to each category label is then obtained by the feature selection method based on permission sensitivity. In the following step, the permission call situation of the application to be detected is compared with the sensitive permission feature set, and the weight allocation method is used to quantify this information into numerical features. In the proposed method of malicious application detection, three machine-learning algorithms are selected to construct the classifier model and optimize the parameters. Compared with traditional methods, the proposed method consumed 60.94% less time while still achieving high accuracy of up to 92.17%.</abstract><cop>London</cop><pub>Hindawi</pub><doi>10.1155/2021/6689486</doi><tpages>12</tpages><orcidid>https://orcid.org/0000-0002-1347-6126</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1939-0114 |
ispartof | Security and communication networks, 2021, Vol.2021, p.1-12 |
issn | 1939-0114 1939-0122 |
language | eng |
recordid | cdi_proquest_journals_2559338806 |
source | Wiley-Blackwell Open Access Titles; EZB-FREE-00999 freely available EZB journals; Alma/SFX Local Collection |
subjects | Accuracy Algorithms Automatic classification Behavior Datasets Feature extraction Machine learning Malware Methods Semantic analysis Semantics Sensitivity Software packages |
title | Permission Sensitivity-Based Malicious Application Detection for Android |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T22%3A43%3A21IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Permission%20Sensitivity-Based%20Malicious%20Application%20Detection%20for%20Android&rft.jtitle=Security%20and%20communication%20networks&rft.au=Song,%20Yubo&rft.date=2021&rft.volume=2021&rft.spage=1&rft.epage=12&rft.pages=1-12&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2021/6689486&rft_dat=%3Cproquest_cross%3E2559338806%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2559338806&rft_id=info:pmid/&rfr_iscdi=true |