Permission Sensitivity-Based Malicious Application Detection for Android

Since a growing number of malicious applications attempt to steal users’ private data by illegally invoking permissions, application stores have carried out many malware detection methods based on application permissions. However, most of them ignore specific permission combinations and application...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Security and communication networks 2021, Vol.2021, p.1-12
Hauptverfasser: Song, Yubo, Geng, Yijin, Wang, Junbo, Gao, Shang, Shi, Wei
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 12
container_issue
container_start_page 1
container_title Security and communication networks
container_volume 2021
creator Song, Yubo
Geng, Yijin
Wang, Junbo
Gao, Shang
Shi, Wei
description Since a growing number of malicious applications attempt to steal users’ private data by illegally invoking permissions, application stores have carried out many malware detection methods based on application permissions. However, most of them ignore specific permission combinations and application categories that affect the detection accuracy. The features they extracted are neither representative enough to distinguish benign and malicious applications. For these problems, an Android malware detection method based on permission sensitivity is proposed. First, for each kind of application categories, the permission features and permission combination features are extracted. The sensitive permission feature set corresponding to each category label is then obtained by the feature selection method based on permission sensitivity. In the following step, the permission call situation of the application to be detected is compared with the sensitive permission feature set, and the weight allocation method is used to quantify this information into numerical features. In the proposed method of malicious application detection, three machine-learning algorithms are selected to construct the classifier model and optimize the parameters. Compared with traditional methods, the proposed method consumed 60.94% less time while still achieving high accuracy of up to 92.17%.
doi_str_mv 10.1155/2021/6689486
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2559338806</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2559338806</sourcerecordid><originalsourceid>FETCH-LOGICAL-c294t-2d089407ea8a79568d805b22dac98e1682e2166c39c59743f10fed3b8c946e8a3</originalsourceid><addsrcrecordid>eNp9kE1LAzEQQIMoWKs3f8CCR12b702OtX5UqCio55Ams5jSbtZkq_Tfu7XFo6d5h8fM8BA6J_iaECFGFFMyklJpruQBGhDNdIkJpYd_TPgxOsl5gbEkvOIDNH2BtAo5h9gUr9Dk0IWv0G3KG5vBF092GVyI61yM27ZH2229W-jA_VIdUzFufIrBn6Kj2i4znO3nEL3f371NpuXs-eFxMp6VjmreldTj_j1cgVW20kIqr7CYU-qt0wqIVBQokdIx7YSuOKsJrsGzuXKaS1CWDdHFbm-b4ucacmcWcZ2a_qShQmjGlMKyt652lksx5wS1aVNY2bQxBJttK7NtZfatev1yp3-Extvv8L_9AwTzaBo</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2559338806</pqid></control><display><type>article</type><title>Permission Sensitivity-Based Malicious Application Detection for Android</title><source>Wiley-Blackwell Open Access Titles</source><source>EZB-FREE-00999 freely available EZB journals</source><source>Alma/SFX Local Collection</source><creator>Song, Yubo ; Geng, Yijin ; Wang, Junbo ; Gao, Shang ; Shi, Wei</creator><contributor>Zhang, Liguo ; Liguo Zhang</contributor><creatorcontrib>Song, Yubo ; Geng, Yijin ; Wang, Junbo ; Gao, Shang ; Shi, Wei ; Zhang, Liguo ; Liguo Zhang</creatorcontrib><description>Since a growing number of malicious applications attempt to steal users’ private data by illegally invoking permissions, application stores have carried out many malware detection methods based on application permissions. However, most of them ignore specific permission combinations and application categories that affect the detection accuracy. The features they extracted are neither representative enough to distinguish benign and malicious applications. For these problems, an Android malware detection method based on permission sensitivity is proposed. First, for each kind of application categories, the permission features and permission combination features are extracted. The sensitive permission feature set corresponding to each category label is then obtained by the feature selection method based on permission sensitivity. In the following step, the permission call situation of the application to be detected is compared with the sensitive permission feature set, and the weight allocation method is used to quantify this information into numerical features. In the proposed method of malicious application detection, three machine-learning algorithms are selected to construct the classifier model and optimize the parameters. Compared with traditional methods, the proposed method consumed 60.94% less time while still achieving high accuracy of up to 92.17%.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2021/6689486</identifier><language>eng</language><publisher>London: Hindawi</publisher><subject>Accuracy ; Algorithms ; Automatic classification ; Behavior ; Datasets ; Feature extraction ; Machine learning ; Malware ; Methods ; Semantic analysis ; Semantics ; Sensitivity ; Software packages</subject><ispartof>Security and communication networks, 2021, Vol.2021, p.1-12</ispartof><rights>Copyright © 2021 Yubo Song et al.</rights><rights>Copyright © 2021 Yubo Song et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c294t-2d089407ea8a79568d805b22dac98e1682e2166c39c59743f10fed3b8c946e8a3</cites><orcidid>0000-0002-1347-6126</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,4024,27923,27924,27925</link.rule.ids></links><search><contributor>Zhang, Liguo</contributor><contributor>Liguo Zhang</contributor><creatorcontrib>Song, Yubo</creatorcontrib><creatorcontrib>Geng, Yijin</creatorcontrib><creatorcontrib>Wang, Junbo</creatorcontrib><creatorcontrib>Gao, Shang</creatorcontrib><creatorcontrib>Shi, Wei</creatorcontrib><title>Permission Sensitivity-Based Malicious Application Detection for Android</title><title>Security and communication networks</title><description>Since a growing number of malicious applications attempt to steal users’ private data by illegally invoking permissions, application stores have carried out many malware detection methods based on application permissions. However, most of them ignore specific permission combinations and application categories that affect the detection accuracy. The features they extracted are neither representative enough to distinguish benign and malicious applications. For these problems, an Android malware detection method based on permission sensitivity is proposed. First, for each kind of application categories, the permission features and permission combination features are extracted. The sensitive permission feature set corresponding to each category label is then obtained by the feature selection method based on permission sensitivity. In the following step, the permission call situation of the application to be detected is compared with the sensitive permission feature set, and the weight allocation method is used to quantify this information into numerical features. In the proposed method of malicious application detection, three machine-learning algorithms are selected to construct the classifier model and optimize the parameters. Compared with traditional methods, the proposed method consumed 60.94% less time while still achieving high accuracy of up to 92.17%.</description><subject>Accuracy</subject><subject>Algorithms</subject><subject>Automatic classification</subject><subject>Behavior</subject><subject>Datasets</subject><subject>Feature extraction</subject><subject>Machine learning</subject><subject>Malware</subject><subject>Methods</subject><subject>Semantic analysis</subject><subject>Semantics</subject><subject>Sensitivity</subject><subject>Software packages</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kE1LAzEQQIMoWKs3f8CCR12b702OtX5UqCio55Ams5jSbtZkq_Tfu7XFo6d5h8fM8BA6J_iaECFGFFMyklJpruQBGhDNdIkJpYd_TPgxOsl5gbEkvOIDNH2BtAo5h9gUr9Dk0IWv0G3KG5vBF092GVyI61yM27ZH2229W-jA_VIdUzFufIrBn6Kj2i4znO3nEL3f371NpuXs-eFxMp6VjmreldTj_j1cgVW20kIqr7CYU-qt0wqIVBQokdIx7YSuOKsJrsGzuXKaS1CWDdHFbm-b4ucacmcWcZ2a_qShQmjGlMKyt652lksx5wS1aVNY2bQxBJttK7NtZfatev1yp3-Extvv8L_9AwTzaBo</recordid><startdate>2021</startdate><enddate>2021</enddate><creator>Song, Yubo</creator><creator>Geng, Yijin</creator><creator>Wang, Junbo</creator><creator>Gao, Shang</creator><creator>Shi, Wei</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0002-1347-6126</orcidid></search><sort><creationdate>2021</creationdate><title>Permission Sensitivity-Based Malicious Application Detection for Android</title><author>Song, Yubo ; Geng, Yijin ; Wang, Junbo ; Gao, Shang ; Shi, Wei</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c294t-2d089407ea8a79568d805b22dac98e1682e2166c39c59743f10fed3b8c946e8a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Accuracy</topic><topic>Algorithms</topic><topic>Automatic classification</topic><topic>Behavior</topic><topic>Datasets</topic><topic>Feature extraction</topic><topic>Machine learning</topic><topic>Malware</topic><topic>Methods</topic><topic>Semantic analysis</topic><topic>Semantics</topic><topic>Sensitivity</topic><topic>Software packages</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Song, Yubo</creatorcontrib><creatorcontrib>Geng, Yijin</creatorcontrib><creatorcontrib>Wang, Junbo</creatorcontrib><creatorcontrib>Gao, Shang</creatorcontrib><creatorcontrib>Shi, Wei</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access Journals</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Song, Yubo</au><au>Geng, Yijin</au><au>Wang, Junbo</au><au>Gao, Shang</au><au>Shi, Wei</au><au>Zhang, Liguo</au><au>Liguo Zhang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Permission Sensitivity-Based Malicious Application Detection for Android</atitle><jtitle>Security and communication networks</jtitle><date>2021</date><risdate>2021</risdate><volume>2021</volume><spage>1</spage><epage>12</epage><pages>1-12</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>Since a growing number of malicious applications attempt to steal users’ private data by illegally invoking permissions, application stores have carried out many malware detection methods based on application permissions. However, most of them ignore specific permission combinations and application categories that affect the detection accuracy. The features they extracted are neither representative enough to distinguish benign and malicious applications. For these problems, an Android malware detection method based on permission sensitivity is proposed. First, for each kind of application categories, the permission features and permission combination features are extracted. The sensitive permission feature set corresponding to each category label is then obtained by the feature selection method based on permission sensitivity. In the following step, the permission call situation of the application to be detected is compared with the sensitive permission feature set, and the weight allocation method is used to quantify this information into numerical features. In the proposed method of malicious application detection, three machine-learning algorithms are selected to construct the classifier model and optimize the parameters. Compared with traditional methods, the proposed method consumed 60.94% less time while still achieving high accuracy of up to 92.17%.</abstract><cop>London</cop><pub>Hindawi</pub><doi>10.1155/2021/6689486</doi><tpages>12</tpages><orcidid>https://orcid.org/0000-0002-1347-6126</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1939-0114
ispartof Security and communication networks, 2021, Vol.2021, p.1-12
issn 1939-0114
1939-0122
language eng
recordid cdi_proquest_journals_2559338806
source Wiley-Blackwell Open Access Titles; EZB-FREE-00999 freely available EZB journals; Alma/SFX Local Collection
subjects Accuracy
Algorithms
Automatic classification
Behavior
Datasets
Feature extraction
Machine learning
Malware
Methods
Semantic analysis
Semantics
Sensitivity
Software packages
title Permission Sensitivity-Based Malicious Application Detection for Android
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T22%3A43%3A21IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Permission%20Sensitivity-Based%20Malicious%20Application%20Detection%20for%20Android&rft.jtitle=Security%20and%20communication%20networks&rft.au=Song,%20Yubo&rft.date=2021&rft.volume=2021&rft.spage=1&rft.epage=12&rft.pages=1-12&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2021/6689486&rft_dat=%3Cproquest_cross%3E2559338806%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2559338806&rft_id=info:pmid/&rfr_iscdi=true