Android Malware Detection

Authors

  • Mrs Hamsareka S  Assistant Professor, Department of Computer science and engineering, KSR Institute for Engineering and Technology, Tiruchengode, Tamil Nadu, India
  • Krishnamoorthy S  Department of Computer science and engineering, KSR Institute for Engineering and Technology, Tiruchengode, Tamil Nadu, India
  • Prasanth T  Department of Computer science and engineering, KSR Institute for Engineering and Technology, Tiruchengode, Tamil Nadu, India
  • Purusothaman R  Department of Computer science and engineering, KSR Institute for Engineering and Technology, Tiruchengode, Tamil Nadu, India
  • Santhosh Kumar A  Department of Computer science and engineering, KSR Institute for Engineering and Technology, Tiruchengode, Tamil Nadu, India

Keywords:

Android, Malware, Risk Ranker, mobile security, permissions

Abstract

Malicious applications pose a threat to the security of the Android platform. The growing amount and diversity of these applications render conventional defenses largely ineffective and thus Android smartphones often remain un-protected from novel malware. In this paper, we propose DREBIN, a lightweight method for detection of Android malware that enables identifying malicious applications directly on the smartphone. As the limited resources impede monitoring applications at run-time, DREBIN performs static analysis abroad, gathering as many features of an application as possible. These features are embedded in a joint vector space, such that typical patterns indicative for malware can be automatically identified and used for explaining the decisions of our method. In an evaluation with 123,453 applications and 5,560 malware samples DREBIN outperforms several related approaches and detects 94% of the malware with few false alarms, where the explanations provided for each detection reveal relevant properties of the detected malware. On five popular smartphones, the method requires 10 seconds for an analysis on average, rendering it suitable for checking downloaded applications directly on the device.

References

  1. M.Grace, Y.Zhou, Q.Zhang, S.Zou and X.Jiang, “RiskRanker: Scalable and accurate zero-day android malware detection,” inProc.10thInt.Conf. Mobile Syst., Appl., Services, 2012, pp. 281–294.
  2. A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, “Android permissions demystified,” in Proc. 18th ACM Conf. Comput. Commun. Security, 2011, pp. 627–638.
  3. W. Enck et al., “TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones, ”ACMTrans. Comput.Syst., vol. 32, no. 2, 2014, Art. no. 5.
  4. D. Arp, M. Spreitzenbarth, M. H¨ubner, H. Gascon, K. Rieck, and C. Siemens, “DREBIN: Effective and explainable detection of android malware in your pocket,” presented at Annu. Symp. Netw. Distrib. Syst. Security, 2014.
  5. C. Yang, Z. Xu, G. Gu, V. Yegneswaran, and P. Porras, “DroidMiner: Automated mining and characterization of fine-grained malicious behaviors android applications,”inProc.Eur.Symp.Res.Comput.Security,2014, pp. 163–182.
  6. Gartner Says Sales of Mobile Devices Grew 5.6 Percent in Third Quarter of 2011; Smartphone Sales Increased 42 Percent. http://www.gartner.com/it/ page.jsp?id=1848514.
  7. Android Market. http://www.android.com/market/.
  8. Amazon Appstore for Android. http://www.amazon. com/mobile-apps/b?ie=UTF8&node=2350149011.
  9. APPLE,INC. Apple's App Store Downloads Top Three Billion. http://www.apple.com/pr/library/2010/ 01/05appstore.html, January2010.

Downloads

Published

2021-04-10

Issue

Section

Research Articles

How to Cite

[1]
Mrs Hamsareka S, Krishnamoorthy S, Prasanth T, Purusothaman R, Santhosh Kumar A, " Android Malware Detection, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 9, Issue 1, pp.957-964, March-April-2021.