Android malware classification based on ANFIS with fuzzy c-means clustering using significant application permissions

Android malware classification based on ANFIS with fuzzy c-means clustering using significant application permissions

Mobile phones have become an essential part of our lives because we depend on them to perform many tasks, and they contain personal and important information. The continuous growth in the number of Android mobile applications resulted in an increase in the number of malware applications, which are real threats and can cause great losses. There is an urgent need for efficient and effective Android malware detection techniques. In this paper, we present an adaptive neuro-fuzzy inference system with fuzzy c-means clustering (FCM-ANFIS) for Android malware classification. The proposed approach utilizes the FCM clustering method to determine the optimum number of clusters and cluster centers, which improves the classification accuracy of the ANFIS. The most significant permissions used in the Android application selected by the information gain algorithm are used as input to the proposed approach (FCM-ANFIS) to classify applications as either malware or benign applications. The experimental results show that the proposed approach (FCM-ANFIS) achieves the highest classification accuracy of 91%, with lowest false positive and false negative rates of 0.5% and 0.4%, respectively.

___

  • [1] Yang HC, Chang WC. Ubiquitous smartphone platform for K-7 students learning geography in Taiwan. Multimed Tools Appl (in press).
  • [2] Yu S, Gu G, Barnawi A, Guo S, Stojmenovic I. Malware propagation in large-scale networks. IEEE T Knowl Data Eng 2015; 27: 170-179.
  • [3] Speed T, Nykamp D, Anderson J, Nampalli J, Heiser M. Mobile Security: How to Secure, Privatize, and Recover Your Devices. Birmingham, UK: Packt Publishing, 2013.
  • [4] Huang CY, Tsai YT, Hsu CH. Performance evaluation on permission-based detection for android malware. In: Advances in Intelligent Systems and Applications; 2013. Berlin, Germany: Springer, pp. 111-120.
  • [5] Rai PO. Android Application Security Essentials. Birmingham, UK: Packt Publishing, 2013.
  • [6] Amos B, Turner H, White J. Applying machine learning classifiers to dynamic android malware detection at scale. In: 2013 9th International Wireless Communications and Mobile Computing Conference; 1 July 2013; Cagliari, Italy. New York, NY, USA: IEEE. pp. 1666-1671.
  • [7] Grace M, Zhou Y, Zhang Q, Zou S, Jiang X. Riskranker: scalable and accurate zero-day android malware detection. In: Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services; 25 June 2012; Low Wood Bay, UK. New York, NY, USA: ACM. pp. 281-294.
  • [8] Abdulla S, Altaher A. Intelligent approach for Android malware detection. KSII Transactions on Internet and Information Systems 2015; 9: 2964-2983.
  • [9] Gibler C, Crussell J, Erickson J, Chen H. AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale. In: International Conference on Trust and Trustworthy Computing; 13 June 2012; Vienna, Austria. Berlin, Germany: Springer. pp. 291-307.
  • [10] Shabtai A, Kanonov U, Elovici Y, Glezer C, Weiss Y. Andromaly: A behavioral malware detection framework for android devices J Intell Inf Syst 2012; 38: 161-190.
  • [11] Arp D, Spreitzenbarth M, Hubner M, Gascon H, Rieck K. DREBIN: Effective and explainable detection of android malware in your pocket. In: Network and Distributed System Security Symposium; 23 February 2014; San Diego, CA, USA.
  • [12] Fuchs AP, Chaudhuri A, Foster JS. SCAndroid: Automated Security Certification of Android Applications. Technical Report CS-TR-4991. College Park, MD, USA: Department of Computer Science, University of Maryland, 2009.
  • [13] Shabtai A, Moskovitch R, Elovici Y, Glezer C. Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey. Information Security Technical Report 2009; 14: 16-29.
  • [14] Xiong P, Wang X, Niu W, Zhu T, Li G. Android malware detection with contrasting permission patterns. China Commun 2014; 11: 1-14.
  • [15] Enck W, Gilbert P, Han S, Tendulkar V, Chun BG, Cox LP, Jung J, McDaniel P, Sheth AN. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM T Comput Syst 2014; 32: 5.
  • [16] Rastogi V, Chen Y, Jiang X. Droidchameleon: evaluating android anti-malware against transformation attacks. In: 8th ACM SIGSAC Symposium on Information, Computer and Communications Security; 2013. New York, NY, USA: ACM. pp. 329-334.
  • [17] Cimpoe M, Anton D, Ciortuz L. Malware detection using machine learning. In: 2009 International Multiconference on Computer Science and Information Technology; 12–14 October 2009; Mragowo, Poland. New York, NY, USA: IEEE. pp. 735-741.
  • [18] Santos I, Nieves J, Bringas PG. Semi-supervised learning for unknown malware detection. In: International Symposium on Distributed Computing and Artificial Intelligence. Berlin, Germany: Springer, 2011. pp. 415-422.
  • [19] Firdausi I, Erwin A, Nugroho AS. Analysis of machine learning techniques used in behavior-based malware detection. In: 2010 Second International Conference on Advances in Computing, Control and Telecommunication Technologies; 2–3 December 2010; Jakarta, Indonesia. New York, NY, USA: IEEE. pp. 201-203.
  • [20] Zhou Y, Jiang X. Dissecting android malware: characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy; 20–23 May 2012; San Francisco, CA, USA. New York, NY, USA: IEEE. pp. 95-109.
  • [21] Yang C, Xu Z, Gu G, Yegneswaran V, Porras P. Droidminer: Automated mining and characterization of finegrained malicious behaviors in android applications. In: European Symposium on Research in Computer Security; 7 September 2014; Wroclaw, Poland. pp. 163-182.
  • [22] Zhang M, Duan Y, Yin H, Zhao Z. Semantics-aware android malware classification using weighted contextual API dependency graphs. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security; 3 November 2014; Scottsdale, AZ, USA. New York, NY, USA: ACM. pp. 1105-1116.
  • [23] Burguera I, Zurutuza U, Nadjm-Tehrani S. Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM workshop on Security and Privacy in Smartphones and Mobile Devices; 17 October 2011; Chicago, IL, USA. New York, NY, USA: ACM. pp. 15-26.
  • [24] Bezdek JC. Pattern Recognition with Fuzzy Objective Function Algorithms. Dordrecht, the Netherlands: Kluwer Academic Publishers, 1981.
  • [25] Jang JS. ANFIS: Adaptive-network-based fuzzy inference system. IEEE T Syst Man Cyb 1993; 23: 665-685.
  • [26] Santos I, Brezo F, Ugarte-Pedrero X, Bringas PG. Opcode sequences as representation of executables for datamining-based unknown malware detection. Inform Sciences 2013; 231: 64-82.
  • [27] Jeon J, Micinski KK, Vaughan JA, Fogel A, Reddy N, Foster JS, Millstein T. Dr. Android and Mr. Hide: finegrained permissions in android applications. In: Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices; 19 October 2012; Raleigh, NC, USA. New York, NY, USA: ACM. pp. 3-14.
  • [28] Feizollah A, Anuar NB, Salleh R, Wahab AW. A review on feature selection in mobile malware detection. Digit Invest 2015; 13: 22-37.
  • [29] Mori T. Information gain ratio as term weight: the case of summarization of IR results. In: Proceedings of the 19th International Conference on Computational Linguistics; 24 August 2002; Taipei, Taiwan. pp. 1-7.
  • [30] Singh R, Kainthola A, Singh TN. Estimation of elastic constant of rocks using an ANFIS approach. Appl Soft Comput 2012; 12: 40-45.
  • [31] Kasabov NK, Song Q. DENFIS: dynamic evolving neural-fuzzy inference system and its application for time-series prediction. IEEE T Fuzzy Syst, 2002; 10: 144-154.
Turkish Journal of Electrical Engineering and Computer Sciences-Cover
  • ISSN: 1300-0632
  • Yayın Aralığı: Yılda 6 Sayı
  • Yayıncı: TÜBİTAK
Sayıdaki Diğer Makaleler

Investigation of adaptive control of robot manipulators with uncertain features for trajectory tracking employing HIL simulation technique

Senthil Kumar PERUMAL JAGATHEESA, Senthil Kumar NATARAJAN

Regional ionospheric trend statistics: IONOLAB-PDF

Feza ARIKAN, Ozan KÖROĞLU

Comparative study of conventional modulation schemes in terms of conducted and radiated EMI generated by three-phase inverters

Mahmoud HAMOUDA, Mohamed SALEM, Jaleleddine SLAMA HADJ BEN

A neuro-fuzzy controller for grid-connected heavy-duty gas turbine power plants

Mohamed Mustafa IQBAL MOHAMED, Rayappan XAVIER JOSEPH, Jagannathan KANAKARAJ

Intellimote: a hybrid classifier for classifying learners' emotion in a distributed e-learning environment

Lopa MANDAL, Samar BHATTACHARYA, Pramatha Nath BASU, Rohan DAS

A marching algorithm for isosurface extraction from face-centered cubic lattices

Yusuf SAHİLLİOĞLU

Planar array of right-angled isosceles triangular microstrip antenna using Koch and meander lines for the Internet of things

Vinita MATHUR, Manisha GUPTA

Error sources and measurement uncertainties in outdoor testing of BIPV modules

Kıvanç BAŞARAN

Statistical features-based comparison of analysis and synthesis of normal and epileptic electroencephalograms for various wavelets

Revati SHRIRAM, Mahalingam SUNDHARARAJAN, Supriya SHETE, Nivedita DAIMIWAL

Eccentricity fault diagnosis in a permanent magnet synchronous motor under nonstationary speed conditions

Mehmet AKAR, Mustafa EKER