Cloud of Word vs DroidKungfu : Performance evaluation in detecting root exploit malware with deep learning approach

Android mobile malware is a type of malware that execute malicious activities (stealing and collecting data and running programs without the user's knowledge) in victims' Android mobile device. There are several types of malware, for instance; 1) Root exploit; 2) Botnet; 3) Trojan; and 4)...

Full description

Bibliographic Details
Main Authors: Che Akmal, Yahaya, Ahmad Firdaus, Zainal Abidin, Azlee, Zabidi, Noor Akma, Abu Bakar, Mukrimah, Nawir, Philimal Normelissa Ani, Abdul Malek
Format: Conference or Workshop Item
Language:English
English
Published: Institute of Electrical and Electronics Engineers Inc. 2023
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/40330/1/Cloud%20of%20Word%20vs%20DroidKungfu_Performance%20evaluation%20in%20detecting.pdf
http://umpir.ump.edu.my/id/eprint/40330/2/Cloud%20of%20Word%20vs%20DroidKungfu_Performance%20evaluation%20in%20detecting%20root%20exploit%20malware%20with%20deep%20learning%20approach_ABS.pdf
_version_ 1796996228843569152
author Che Akmal, Yahaya
Ahmad Firdaus, Zainal Abidin
Azlee, Zabidi
Noor Akma, Abu Bakar
Mukrimah, Nawir
Philimal Normelissa Ani, Abdul Malek
author_facet Che Akmal, Yahaya
Ahmad Firdaus, Zainal Abidin
Azlee, Zabidi
Noor Akma, Abu Bakar
Mukrimah, Nawir
Philimal Normelissa Ani, Abdul Malek
author_sort Che Akmal, Yahaya
collection UMP
description Android mobile malware is a type of malware that execute malicious activities (stealing and collecting data and running programs without the user's knowledge) in victims' Android mobile device. There are several types of malware, for instance; 1) Root exploit; 2) Botnet; 3) Trojan; and 4) Ransomware. Among these, root exploit is the most dangerous as it is able to gain control over the root privileges of an operating system (OS) stealthily, avoids security software scanning, and further installs other types of malware. Moreover, there are multiple types of root exploit families that attack Android, such as Droidkungfu, Droiddream, and Asroot. However, Droidkungfu possesses the highest number of samples among other families and able to survive with updated versions (version one until six). Therefore, the updated version could be increasing in the future. Furthermore, finding the best features in detecting root exploit is challenging, as the categories (permission, system calls, and intent) are many to choose from. Moreover, finding the ideal number of features is challenging as well, as it is able to affect machine learning detection. Thus, this study focuses to develop a solid model to predict undiscovered Droidkungfu by converting all the codes in images and adopted a Convolutional neural network (CNN) with Word of Cloud (WoC) to discover features automatically without considering the categories and number of features in the code. Among all parameters in evaluation, the highest result is 96 % accuracy in predicting unknown Droidkungfu and proved to detect new versions of this family in the future.
first_indexed 2024-04-22T01:25:50Z
format Conference or Workshop Item
id UMPir40330
institution Universiti Malaysia Pahang
language English
English
last_indexed 2024-04-22T01:25:50Z
publishDate 2023
publisher Institute of Electrical and Electronics Engineers Inc.
record_format dspace
spelling UMPir403302024-04-16T04:09:25Z http://umpir.ump.edu.my/id/eprint/40330/ Cloud of Word vs DroidKungfu : Performance evaluation in detecting root exploit malware with deep learning approach Che Akmal, Yahaya Ahmad Firdaus, Zainal Abidin Azlee, Zabidi Noor Akma, Abu Bakar Mukrimah, Nawir Philimal Normelissa Ani, Abdul Malek HD Industries. Land use. Labor QA75 Electronic computers. Computer science QA76 Computer software T Technology (General) TA Engineering (General). Civil engineering (General) Android mobile malware is a type of malware that execute malicious activities (stealing and collecting data and running programs without the user's knowledge) in victims' Android mobile device. There are several types of malware, for instance; 1) Root exploit; 2) Botnet; 3) Trojan; and 4) Ransomware. Among these, root exploit is the most dangerous as it is able to gain control over the root privileges of an operating system (OS) stealthily, avoids security software scanning, and further installs other types of malware. Moreover, there are multiple types of root exploit families that attack Android, such as Droidkungfu, Droiddream, and Asroot. However, Droidkungfu possesses the highest number of samples among other families and able to survive with updated versions (version one until six). Therefore, the updated version could be increasing in the future. Furthermore, finding the best features in detecting root exploit is challenging, as the categories (permission, system calls, and intent) are many to choose from. Moreover, finding the ideal number of features is challenging as well, as it is able to affect machine learning detection. Thus, this study focuses to develop a solid model to predict undiscovered Droidkungfu by converting all the codes in images and adopted a Convolutional neural network (CNN) with Word of Cloud (WoC) to discover features automatically without considering the categories and number of features in the code. Among all parameters in evaluation, the highest result is 96 % accuracy in predicting unknown Droidkungfu and proved to detect new versions of this family in the future. Institute of Electrical and Electronics Engineers Inc. 2023 Conference or Workshop Item PeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/40330/1/Cloud%20of%20Word%20vs%20DroidKungfu_Performance%20evaluation%20in%20detecting.pdf pdf en http://umpir.ump.edu.my/id/eprint/40330/2/Cloud%20of%20Word%20vs%20DroidKungfu_Performance%20evaluation%20in%20detecting%20root%20exploit%20malware%20with%20deep%20learning%20approach_ABS.pdf Che Akmal, Yahaya and Ahmad Firdaus, Zainal Abidin and Azlee, Zabidi and Noor Akma, Abu Bakar and Mukrimah, Nawir and Philimal Normelissa Ani, Abdul Malek (2023) Cloud of Word vs DroidKungfu : Performance evaluation in detecting root exploit malware with deep learning approach. In: 8th International Conference on Software Engineering and Computer Systems, ICSECS 2023 , 25-27 August 2023 , Penang. pp. 217-222. (192961). ISBN 979-835031093-1 https://doi.org/10.1109/ICSECS58457.2023.10256304
spellingShingle HD Industries. Land use. Labor
QA75 Electronic computers. Computer science
QA76 Computer software
T Technology (General)
TA Engineering (General). Civil engineering (General)
Che Akmal, Yahaya
Ahmad Firdaus, Zainal Abidin
Azlee, Zabidi
Noor Akma, Abu Bakar
Mukrimah, Nawir
Philimal Normelissa Ani, Abdul Malek
Cloud of Word vs DroidKungfu : Performance evaluation in detecting root exploit malware with deep learning approach
title Cloud of Word vs DroidKungfu : Performance evaluation in detecting root exploit malware with deep learning approach
title_full Cloud of Word vs DroidKungfu : Performance evaluation in detecting root exploit malware with deep learning approach
title_fullStr Cloud of Word vs DroidKungfu : Performance evaluation in detecting root exploit malware with deep learning approach
title_full_unstemmed Cloud of Word vs DroidKungfu : Performance evaluation in detecting root exploit malware with deep learning approach
title_short Cloud of Word vs DroidKungfu : Performance evaluation in detecting root exploit malware with deep learning approach
title_sort cloud of word vs droidkungfu performance evaluation in detecting root exploit malware with deep learning approach
topic HD Industries. Land use. Labor
QA75 Electronic computers. Computer science
QA76 Computer software
T Technology (General)
TA Engineering (General). Civil engineering (General)
url http://umpir.ump.edu.my/id/eprint/40330/1/Cloud%20of%20Word%20vs%20DroidKungfu_Performance%20evaluation%20in%20detecting.pdf
http://umpir.ump.edu.my/id/eprint/40330/2/Cloud%20of%20Word%20vs%20DroidKungfu_Performance%20evaluation%20in%20detecting%20root%20exploit%20malware%20with%20deep%20learning%20approach_ABS.pdf
work_keys_str_mv AT cheakmalyahaya cloudofwordvsdroidkungfuperformanceevaluationindetectingrootexploitmalwarewithdeeplearningapproach
AT ahmadfirdauszainalabidin cloudofwordvsdroidkungfuperformanceevaluationindetectingrootexploitmalwarewithdeeplearningapproach
AT azleezabidi cloudofwordvsdroidkungfuperformanceevaluationindetectingrootexploitmalwarewithdeeplearningapproach
AT noorakmaabubakar cloudofwordvsdroidkungfuperformanceevaluationindetectingrootexploitmalwarewithdeeplearningapproach
AT mukrimahnawir cloudofwordvsdroidkungfuperformanceevaluationindetectingrootexploitmalwarewithdeeplearningapproach
AT philimalnormelissaaniabdulmalek cloudofwordvsdroidkungfuperformanceevaluationindetectingrootexploitmalwarewithdeeplearningapproach