A Neural Network Based Hybrid Approach for Analysing and Detecting Malware Threat in Android Applications

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Mobile phones has become very integral part in our day to day life. In the digitalized world most of our day to day activities rely on mobile phone like banking activities, wallet payments, credentials, social accounts etc. Our system works in such a way that if there is an advantage to a technology there also exists a disadvantage. Every users have all their private and sensitive data in their mobile phones and download random applications from different platforms like play store, App store etc. There is a huge possibility that the applications downloaded are malicious applications. The existing system provides a solution for detection of such applications with the help of antivirus which has pre-built signatures that can be used to obtain an already existing malware which can be modified and manipulated by the hacker if they tend to do so. In this project, our purpose is to identify the malicious applications using Machine learning. By combining both static analysis and dynamic analysis we can use a Hybrid approach for analysing and detecting malware threats in android applications using Recurrent Neural Network (RNN). The main aim of this project will be to ensure that the application installed is benign, if it is not, it should block such applications and notify the user.


  • Keywords

    Android, Malicious Application, Machine Learning, Hybrid approach, RNN

  • References

      [1] Nayeem Islam ; Saumitra Das ; Yin Chen(2017) On- Device Mobile Phone Security Exploits Machine Learnin IEEE Pervasive Computing

      [2] ( Volume: 16, Issue: 2, April-June 2017 )

      [3] Rhode, M., Burnap, P., Jones, K., Aug. 2017. Early Stage Malware Prediction Using Recurrent Neural Networks. arXiv:1708.03513 [cs]ArXiv:1708.03513.

      [4] URL http://arxiv.org/abs/1708.03513

      [5] D. Arp et al., “DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket,” Proc. Network and Distributed System Security Symp. (NDSS), 2014; www.sec.cs.tubs.de/pubs/2014-ndss.pdf.

      [6] Shuang Liang and Xiaojiang Du “Permission-Combination-based Scheme for Android Mobile Malware Detection” Dept. of Computer and Information Science Temple University, Philadelphia, PA 19121,USA {shuang.liang2012, dux}@temple.edu, IEEE

      [7] Ambra Demontis, Marco Melis, Battista Biggio, Davide Maiorca,Member, IEEE, Daniel Arp, Konrad Rieck, Igino Corona,Giorgio Giacinto, Fabio Roli “Yes, Machine Learning Can Be More Secure! ACase Study on Android Malware Detection”. IEEE Transactions on Dependable and Secure Computing (Volume: PP, Issue: 99 )

      [8] Xiang Li , Jianyi Liu , Yanyu Huo , Ru Zhang , Yuangang Yao “An android malware detection method based On androidmanifest file”, Proceedings of CCIS2016, 2016 IEEE

      [9] T.Wang et al., “Jekyll on iOS: When Benign Apps Become Evil,” Proc. 22nd Usenix Security Symp. (SEC),

      [10] 2013;www.usenix.org/conference/usenixsecurity13/technicalsessions/presentation/wang_tielei.

      [11] J. Oberheide and C. Miller, “Dissecting the Android Bouncer,”SummerCon, 2012.

      [12] N.J. Percoco and S. Schulte, Adventures in Bouncerland: Failures of Automated Malware

      [13] Detection within Mobile Application Markets, Black Hat, 2012.

      [14] N. Idika and A.P. Mathur, A Survey of Malware Detection Techniques, tech. report, Purdue Univ., 2007.

      [15] A.P. Felt et al., “A Survey of Mobile Malware in the Wild,” Proc. First ACM Workshop Security and Privacy in Smartphones and Mobile Devices (SPSM), 2011, pp. 3–14.

      [16] J. Bickford et al., “Security versus Energy Tradeoffs in Host-Based Mobile Malware Detection,” Proc. 9th Int’l Conf. Mobile Systems, Applications, and Services (MobiSys), 2011, pp. 225–238.

      [17] S. Poeplau et al., “Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications,” Proc. 20th Annual Network & Distributed System Security Symp. (NDSS), 2014;https://cs.ucsb.edu/~vigna/publications/2014_NDSS_ExecuteThis.pdf.

      [18] Cyrille Artho,Armin Biere,"Combined Static and DynamicAnalysis",2005https://doi.org/10.1016/j.entcs.2005.01.018

      [19] Willems, C., Freiling, F.C.: Reverse code engineering—state of the art and countermeasures. it-Information Technology, pp. 53–63 (2011)




Article ID: 28452
DOI: 10.14419/ijet.v7i4.6.28452

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.