Cloud of Word vs DroidKungfu : Performance evaluation in detecting root exploit malware with deep learning approach
Android mobile malware is a type of malware that execute malicious activities (stealing and collecting data and running programs without the user's knowledge) in victims' Android mobile device. There are several types of malware, for instance; 1) Root exploit; 2) Botnet; 3) Trojan; and 4)...
Main Authors: | , , , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English English |
Published: |
Institute of Electrical and Electronics Engineers Inc.
2023
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/40330/1/Cloud%20of%20Word%20vs%20DroidKungfu_Performance%20evaluation%20in%20detecting.pdf http://umpir.ump.edu.my/id/eprint/40330/2/Cloud%20of%20Word%20vs%20DroidKungfu_Performance%20evaluation%20in%20detecting%20root%20exploit%20malware%20with%20deep%20learning%20approach_ABS.pdf |
_version_ | 1796996228843569152 |
---|---|
author | Che Akmal, Yahaya Ahmad Firdaus, Zainal Abidin Azlee, Zabidi Noor Akma, Abu Bakar Mukrimah, Nawir Philimal Normelissa Ani, Abdul Malek |
author_facet | Che Akmal, Yahaya Ahmad Firdaus, Zainal Abidin Azlee, Zabidi Noor Akma, Abu Bakar Mukrimah, Nawir Philimal Normelissa Ani, Abdul Malek |
author_sort | Che Akmal, Yahaya |
collection | UMP |
description | Android mobile malware is a type of malware that execute malicious activities (stealing and collecting data and running programs without the user's knowledge) in victims' Android mobile device. There are several types of malware, for instance; 1) Root exploit; 2) Botnet; 3) Trojan; and 4) Ransomware. Among these, root exploit is the most dangerous as it is able to gain control over the root privileges of an operating system (OS) stealthily, avoids security software scanning, and further installs other types of malware. Moreover, there are multiple types of root exploit families that attack Android, such as Droidkungfu, Droiddream, and Asroot. However, Droidkungfu possesses the highest number of samples among other families and able to survive with updated versions (version one until six). Therefore, the updated version could be increasing in the future. Furthermore, finding the best features in detecting root exploit is challenging, as the categories (permission, system calls, and intent) are many to choose from. Moreover, finding the ideal number of features is challenging as well, as it is able to affect machine learning detection. Thus, this study focuses to develop a solid model to predict undiscovered Droidkungfu by converting all the codes in images and adopted a Convolutional neural network (CNN) with Word of Cloud (WoC) to discover features automatically without considering the categories and number of features in the code. Among all parameters in evaluation, the highest result is 96 % accuracy in predicting unknown Droidkungfu and proved to detect new versions of this family in the future. |
first_indexed | 2024-04-22T01:25:50Z |
format | Conference or Workshop Item |
id | UMPir40330 |
institution | Universiti Malaysia Pahang |
language | English English |
last_indexed | 2024-04-22T01:25:50Z |
publishDate | 2023 |
publisher | Institute of Electrical and Electronics Engineers Inc. |
record_format | dspace |
spelling | UMPir403302024-04-16T04:09:25Z http://umpir.ump.edu.my/id/eprint/40330/ Cloud of Word vs DroidKungfu : Performance evaluation in detecting root exploit malware with deep learning approach Che Akmal, Yahaya Ahmad Firdaus, Zainal Abidin Azlee, Zabidi Noor Akma, Abu Bakar Mukrimah, Nawir Philimal Normelissa Ani, Abdul Malek HD Industries. Land use. Labor QA75 Electronic computers. Computer science QA76 Computer software T Technology (General) TA Engineering (General). Civil engineering (General) Android mobile malware is a type of malware that execute malicious activities (stealing and collecting data and running programs without the user's knowledge) in victims' Android mobile device. There are several types of malware, for instance; 1) Root exploit; 2) Botnet; 3) Trojan; and 4) Ransomware. Among these, root exploit is the most dangerous as it is able to gain control over the root privileges of an operating system (OS) stealthily, avoids security software scanning, and further installs other types of malware. Moreover, there are multiple types of root exploit families that attack Android, such as Droidkungfu, Droiddream, and Asroot. However, Droidkungfu possesses the highest number of samples among other families and able to survive with updated versions (version one until six). Therefore, the updated version could be increasing in the future. Furthermore, finding the best features in detecting root exploit is challenging, as the categories (permission, system calls, and intent) are many to choose from. Moreover, finding the ideal number of features is challenging as well, as it is able to affect machine learning detection. Thus, this study focuses to develop a solid model to predict undiscovered Droidkungfu by converting all the codes in images and adopted a Convolutional neural network (CNN) with Word of Cloud (WoC) to discover features automatically without considering the categories and number of features in the code. Among all parameters in evaluation, the highest result is 96 % accuracy in predicting unknown Droidkungfu and proved to detect new versions of this family in the future. Institute of Electrical and Electronics Engineers Inc. 2023 Conference or Workshop Item PeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/40330/1/Cloud%20of%20Word%20vs%20DroidKungfu_Performance%20evaluation%20in%20detecting.pdf pdf en http://umpir.ump.edu.my/id/eprint/40330/2/Cloud%20of%20Word%20vs%20DroidKungfu_Performance%20evaluation%20in%20detecting%20root%20exploit%20malware%20with%20deep%20learning%20approach_ABS.pdf Che Akmal, Yahaya and Ahmad Firdaus, Zainal Abidin and Azlee, Zabidi and Noor Akma, Abu Bakar and Mukrimah, Nawir and Philimal Normelissa Ani, Abdul Malek (2023) Cloud of Word vs DroidKungfu : Performance evaluation in detecting root exploit malware with deep learning approach. In: 8th International Conference on Software Engineering and Computer Systems, ICSECS 2023 , 25-27 August 2023 , Penang. pp. 217-222. (192961). ISBN 979-835031093-1 https://doi.org/10.1109/ICSECS58457.2023.10256304 |
spellingShingle | HD Industries. Land use. Labor QA75 Electronic computers. Computer science QA76 Computer software T Technology (General) TA Engineering (General). Civil engineering (General) Che Akmal, Yahaya Ahmad Firdaus, Zainal Abidin Azlee, Zabidi Noor Akma, Abu Bakar Mukrimah, Nawir Philimal Normelissa Ani, Abdul Malek Cloud of Word vs DroidKungfu : Performance evaluation in detecting root exploit malware with deep learning approach |
title | Cloud of Word vs DroidKungfu : Performance evaluation in detecting root exploit malware with deep learning approach |
title_full | Cloud of Word vs DroidKungfu : Performance evaluation in detecting root exploit malware with deep learning approach |
title_fullStr | Cloud of Word vs DroidKungfu : Performance evaluation in detecting root exploit malware with deep learning approach |
title_full_unstemmed | Cloud of Word vs DroidKungfu : Performance evaluation in detecting root exploit malware with deep learning approach |
title_short | Cloud of Word vs DroidKungfu : Performance evaluation in detecting root exploit malware with deep learning approach |
title_sort | cloud of word vs droidkungfu performance evaluation in detecting root exploit malware with deep learning approach |
topic | HD Industries. Land use. Labor QA75 Electronic computers. Computer science QA76 Computer software T Technology (General) TA Engineering (General). Civil engineering (General) |
url | http://umpir.ump.edu.my/id/eprint/40330/1/Cloud%20of%20Word%20vs%20DroidKungfu_Performance%20evaluation%20in%20detecting.pdf http://umpir.ump.edu.my/id/eprint/40330/2/Cloud%20of%20Word%20vs%20DroidKungfu_Performance%20evaluation%20in%20detecting%20root%20exploit%20malware%20with%20deep%20learning%20approach_ABS.pdf |
work_keys_str_mv | AT cheakmalyahaya cloudofwordvsdroidkungfuperformanceevaluationindetectingrootexploitmalwarewithdeeplearningapproach AT ahmadfirdauszainalabidin cloudofwordvsdroidkungfuperformanceevaluationindetectingrootexploitmalwarewithdeeplearningapproach AT azleezabidi cloudofwordvsdroidkungfuperformanceevaluationindetectingrootexploitmalwarewithdeeplearningapproach AT noorakmaabubakar cloudofwordvsdroidkungfuperformanceevaluationindetectingrootexploitmalwarewithdeeplearningapproach AT mukrimahnawir cloudofwordvsdroidkungfuperformanceevaluationindetectingrootexploitmalwarewithdeeplearningapproach AT philimalnormelissaaniabdulmalek cloudofwordvsdroidkungfuperformanceevaluationindetectingrootexploitmalwarewithdeeplearningapproach |