skip to main content
10.1145/3340422.3343639acmconferencesArticle/Chapter ViewAbstractPublication PagesaintecConference Proceedingsconference-collections
research-article

Android Malware Prediction Using Extreme Learning Machine with Different Kernel Functions

Published:07 August 2019Publication History

ABSTRACT

Android is currently the most popular smartphone platform which occupied 88% of global sale by the end of 2nd quarter 2018. With the popularity of these applications, it is also inviting cybercriminals to develop malware application for accessing important information from smartphones. The major objective of cybercriminals to develop Malware apps or Malicious apps to threaten the organization privacy data, user privacy data, and device integrity. Early identification of such malware apps can help the android user to save private data and device integrity. In this study, features extracted from intermediate code representations obtained using decompilation of APK file are used for providing requisite input data to develop the models for predicting android malware applications. These models are trained using extreme learning with multiple kernel functions ans also compared with the model trained using most frequently used classifiers like linear regression, decision tree, polynomial regression, and logistic regression. This paper also focuses on the effectiveness of data sampling techniques for balancing data and feature selection methods for selecting right sets of significant uncorrelated metrics. The high-value of accuracy and AUC confirm the predicting capability of data sampling, sets of metrics, and training algorithms to malware and normal applications.

References

  1. ARORA, A., AND PEDDOJU, S. K. Minimizing network traffic features for android mobile malware detection. In Proceedings of the 18th International Conference on Distributed Computing and Networking (2017), ACM, p. 32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. ARORA, A., AND PEDDOJU, S. K. Ntpdroid: A hybrid android malware detector using network traffic and system permissions. In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (2018), IEEE, pp. 808--813.Google ScholarGoogle ScholarCross RefCross Ref
  3. CHIDAMBER, S. R., AND KEMERER, C. F. Towards a metrics suite for object oriented design. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. CHIDAMBER, S. R., AND KEMERER, C. F. A metrics suite for object oriented design. IEEE Transactions on software engineering 20, 6 (1994), 476--493. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. DEMONTIS, A., MELIS, M., BIGGIO, B., MAIORCA, D., ARP, D., RIECK, K., CORONA, I., GIACINTO, G., AND ROLI, F. Yes, machine learning can be more secure! a case study on android malware detection. IEEE Transactions on Dependable and Secure Computing (2017). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. HUANG, G.-B., ZHU, Q.-Y., AND SIEW, C.-K. Extreme learning machine: theory and applications. Neurocomputing 70, 1-3 (2006), 489--501.Google ScholarGoogle ScholarCross RefCross Ref
  7. KADIR, A. F. A., STAKHANOVA, N., AND GHORBANI, A. A. Android botnets: What urls are telling us. In International Conference on Network and System Security (2015), Springer, pp. 78--91.Google ScholarGoogle ScholarCross RefCross Ref
  8. KUMAR, D. R., AND CHANAKYA, G. Refactoring framework for instance code smell detection. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) 3, 9 (2014).Google ScholarGoogle Scholar
  9. KUMAR, L., SATAPATHY, S. M., AND KRISHNA, A. Application of smote and lssvm with various kernels for predicting refactoring at method level. In International Conference on Neural Information Processing (2018), Springer, pp. 150--161.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. KUMAR, L., SRIPADA, S. K., SUREKA, A., AND RATH, S. K. Effective fault prediction model developed using least square support vector machine (lssvm). Journal of Systems and Software 137 (2018), 686--712.Google ScholarGoogle ScholarCross RefCross Ref
  11. KUMAR, M., MEENA, J., SINGH, R., AND VARDHAN, M. Data outsourcing: A threat to confidentiality, integrity, and availability. In 2015 International Conference on Green Computing and Internet of Things (ICGCIoT) (2015), IEEE, pp. 1496--1501. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. KUMAR, R., SINGH, J., AND KAUR, A. An empirical study of bad smell in code on maintenance effort. Int. J. Comput. Sci. Eng 5 (2016), 294--306.Google ScholarGoogle Scholar
  13. LI, W., AND HENRY, S. Maintenance metrics for the object oriented paradigm. In {1993} Proceedings First International Software Metrics Symposium (1993), IEEE, pp. 52--60.Google ScholarGoogle Scholar
  14. MAHINDRU, A., AND SINGH, P. Dynamic permissions based android malware detection using machine learning techniques. In Proceedings of the 10th Innovations in Software Engineering Conference (2017), ACM, pp. 202--210. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. MCLAUGHLIN, N., MARTINEZ DEL RINCON, J., KANG, B., YERIMA, S., MILLER, P., SEZER, S., SAFAEI, Y., TRICKEL, E., ZHAO, Z., DOUPÉ, A., ET AL. Deep android malware detection. In Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy (2017), ACM, pp. 301--308. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. ROJAS, J. A. R., KERY, M. B., ROSENTHAL, S., AND DEY, A. Sampling techniques to improve big data exploration. In 2017 IEEE 7th symposium on large data analysis and visualization (LDAV) (2017), IEEE, pp. 26--35.Google ScholarGoogle ScholarCross RefCross Ref
  17. SHEEN, S., ANITHA, R., AND NATARAJAN, V. Android based malware detection using a multifeature collaborative decision fusion approach. Neurocomputing 151 (2015), 905--912.Google ScholarGoogle ScholarCross RefCross Ref
  18. ZHOU, Y., AND JIANG, X. Dissecting android malware: Characterization and evolution. In 2012 IEEE symposium on security and privacy (2012), IEEE, pp. 95--109. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Android Malware Prediction Using Extreme Learning Machine with Different Kernel Functions

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        AINTEC '19: Proceedings of the 15th Asian Internet Engineering Conference
        August 2019
        60 pages
        ISBN:9781450368490
        DOI:10.1145/3340422

        Copyright © 2019 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 7 August 2019

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        Overall Acceptance Rate15of38submissions,39%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader