BENCHMARKING MACHINE LEARNING ALGORITHMS FOR ANDROID MALWARE DETECTION
Nowadays, smartphones have captured a significant part of human life and has led to an increasing number of users involved with this technology. The rising number of users has encouraged hackers to generate malicious applications. Identifying these malwares is critical for preserving the security an...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Scientific Research Support Fund of Jordan (SRSF) and Princess Sumaya University for Technology (PSUT)
2019-12-01
|
Series: | Jordanian Journal of Computers and Information Technology |
Subjects: | |
Online Access: | http://jjcit.org/Volume%2005,%20Number%2003/5-DOI%2010.5455-jjcit.71-1558862640.pdf |
id |
doaj-41ca7b18a44c4f8e9a7ed0b65430e8e1 |
---|---|
record_format |
Article |
spelling |
doaj-41ca7b18a44c4f8e9a7ed0b65430e8e12020-11-25T02:17:59ZengScientific Research Support Fund of Jordan (SRSF) and Princess Sumaya University for Technology (PSUT)Jordanian Journal of Computers and Information Technology 2413-93512415-10762019-12-0105321623010.5455/jjcit.71-1558862640BENCHMARKING MACHINE LEARNING ALGORITHMS FOR ANDROID MALWARE DETECTIONSomayyeh Fallah0Amir Jalaly Bidgoly1Department of Computer Engineering, University of Qom, Iran.Department of Computer Engineering, University of Qom, Iran.Nowadays, smartphones have captured a significant part of human life and has led to an increasing number of users involved with this technology. The rising number of users has encouraged hackers to generate malicious applications. Identifying these malwares is critical for preserving the security and privacy of users. The recent trend of cyber security shows that threats can be effectively identified using network-based detection techniques and machine learning methods. In this paper, several well-known methods of machine learning were investigated for smartphone malware detection using network traffic. A wide range of malware families are used in the investigations, including Adware, Ransomware, Scareware and SMS Malware. Also, the most used and famous supervised and unsupervised machine learning methods are considered. This article benchmarked the methods from different points of view, such as the required features count, the recorded traffic volume, the ability of malware family identification and the ability of a new malware family detection. The results showed that using these methods with appropriate features and traffic volume would achieve the F1-measure of malware detection by a percentage of about 90%. However, these methods did not show acceptable results in detecting malicious as well as new families of malware. The paper also explained some of the challenges and potential research problems in this context which can be used by researchers interested in this fieldhttp://jjcit.org/Volume%2005,%20Number%2003/5-DOI%2010.5455-jjcit.71-1558862640.pdfandroid malwaremalware detectionnetwork trafficmachine learning |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Somayyeh Fallah Amir Jalaly Bidgoly |
spellingShingle |
Somayyeh Fallah Amir Jalaly Bidgoly BENCHMARKING MACHINE LEARNING ALGORITHMS FOR ANDROID MALWARE DETECTION Jordanian Journal of Computers and Information Technology android malware malware detection network traffic machine learning |
author_facet |
Somayyeh Fallah Amir Jalaly Bidgoly |
author_sort |
Somayyeh Fallah |
title |
BENCHMARKING MACHINE LEARNING ALGORITHMS FOR ANDROID MALWARE DETECTION |
title_short |
BENCHMARKING MACHINE LEARNING ALGORITHMS FOR ANDROID MALWARE DETECTION |
title_full |
BENCHMARKING MACHINE LEARNING ALGORITHMS FOR ANDROID MALWARE DETECTION |
title_fullStr |
BENCHMARKING MACHINE LEARNING ALGORITHMS FOR ANDROID MALWARE DETECTION |
title_full_unstemmed |
BENCHMARKING MACHINE LEARNING ALGORITHMS FOR ANDROID MALWARE DETECTION |
title_sort |
benchmarking machine learning algorithms for android malware detection |
publisher |
Scientific Research Support Fund of Jordan (SRSF) and Princess Sumaya University for Technology (PSUT) |
series |
Jordanian Journal of Computers and Information Technology |
issn |
2413-9351 2415-1076 |
publishDate |
2019-12-01 |
description |
Nowadays, smartphones have captured a significant part of human life and has led to an increasing number of users involved with this technology. The rising number of users has encouraged hackers to generate malicious applications. Identifying these malwares is critical for preserving the security and privacy of users. The recent trend of cyber security shows that threats can be effectively identified using network-based detection techniques and machine learning methods. In this paper, several well-known methods of machine learning were investigated for smartphone malware detection using network traffic. A wide range of malware families are used in the investigations, including Adware, Ransomware, Scareware and SMS Malware. Also, the most used and famous supervised and unsupervised machine learning methods are considered. This article benchmarked the methods from different points of view, such as the required features count, the recorded traffic volume, the ability of malware family identification and the ability of a new malware family detection. The results showed that using these methods with appropriate features and traffic volume would achieve the F1-measure of malware detection by a percentage of about 90%. However, these methods did not show acceptable results in detecting malicious as well as new families of malware. The paper also explained some of the challenges and potential research problems in this context which can be used by researchers interested in this field |
topic |
android malware malware detection network traffic machine learning |
url |
http://jjcit.org/Volume%2005,%20Number%2003/5-DOI%2010.5455-jjcit.71-1558862640.pdf |
work_keys_str_mv |
AT somayyehfallah benchmarkingmachinelearningalgorithmsforandroidmalwaredetection AT amirjalalybidgoly benchmarkingmachinelearningalgorithmsforandroidmalwaredetection |
_version_ |
1724883903859130368 |