Dynamic IoT Malware Detection in Android Systems Using Profile Hidden Markov Models

The prevalence of malware attacks that target IoT systems has raised an alarm and highlighted the need for efficient mechanisms to detect and defeat them. However, detecting malware is challenging, especially malware with new or unknown behaviors. The main problem is that malware can hide, so it can...

Full description

Bibliographic Details
Main Authors: Norah Abanmi, Heba Kurdi, Mai Alzamel
Format: Article
Language:English
Published: MDPI AG 2022-12-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/13/1/557
_version_ 1797626178042855424
author Norah Abanmi
Heba Kurdi
Mai Alzamel
author_facet Norah Abanmi
Heba Kurdi
Mai Alzamel
author_sort Norah Abanmi
collection DOAJ
description The prevalence of malware attacks that target IoT systems has raised an alarm and highlighted the need for efficient mechanisms to detect and defeat them. However, detecting malware is challenging, especially malware with new or unknown behaviors. The main problem is that malware can hide, so it cannot be detected easily. Furthermore, information about malware families is limited which restricts the amount of “big data” that is available for analysis. The motivation of this paper is two-fold. First, to introduce a new Profile Hidden Markov Model (PHMM) that can be used for both app analysis and classification in Android systems. Second, to dynamically identify suspicious calls while reducing infection risks of executed codes. We focused on Android systems, as they are more vulnerable than other IoT systems due to their ubiquitousness and sideloading features. The experimental results showed that the proposed <b>D</b>ynamic <b>I</b>oT malware Detection in Android Systems using <b>P</b>HMM (DIP) achieved superior performance when benchmarked against eight rival malware detection frameworks, showing up to 96.3% accuracy at 5% False Positive Rate (FP rate), 3% False Negative Rate (FN rate) and 94.9% F-measure.
first_indexed 2024-03-11T10:06:48Z
format Article
id doaj.art-642ba7deec014a61bb3f01b471b2a3a2
institution Directory Open Access Journal
issn 2076-3417
language English
last_indexed 2024-03-11T10:06:48Z
publishDate 2022-12-01
publisher MDPI AG
record_format Article
series Applied Sciences
spelling doaj.art-642ba7deec014a61bb3f01b471b2a3a22023-11-16T14:58:39ZengMDPI AGApplied Sciences2076-34172022-12-0113155710.3390/app13010557Dynamic IoT Malware Detection in Android Systems Using Profile Hidden Markov ModelsNorah Abanmi0Heba Kurdi1Mai Alzamel2Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh P.O. Box 145111, Saudi ArabiaDepartment of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh P.O. Box 145111, Saudi ArabiaDepartment of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh P.O. Box 145111, Saudi ArabiaThe prevalence of malware attacks that target IoT systems has raised an alarm and highlighted the need for efficient mechanisms to detect and defeat them. However, detecting malware is challenging, especially malware with new or unknown behaviors. The main problem is that malware can hide, so it cannot be detected easily. Furthermore, information about malware families is limited which restricts the amount of “big data” that is available for analysis. The motivation of this paper is two-fold. First, to introduce a new Profile Hidden Markov Model (PHMM) that can be used for both app analysis and classification in Android systems. Second, to dynamically identify suspicious calls while reducing infection risks of executed codes. We focused on Android systems, as they are more vulnerable than other IoT systems due to their ubiquitousness and sideloading features. The experimental results showed that the proposed <b>D</b>ynamic <b>I</b>oT malware Detection in Android Systems using <b>P</b>HMM (DIP) achieved superior performance when benchmarked against eight rival malware detection frameworks, showing up to 96.3% accuracy at 5% False Positive Rate (FP rate), 3% False Negative Rate (FN rate) and 94.9% F-measure.https://www.mdpi.com/2076-3417/13/1/557cybersecurityInternet of ThingsMarkov ModelAndroidmalware detection
spellingShingle Norah Abanmi
Heba Kurdi
Mai Alzamel
Dynamic IoT Malware Detection in Android Systems Using Profile Hidden Markov Models
Applied Sciences
cybersecurity
Internet of Things
Markov Model
Android
malware detection
title Dynamic IoT Malware Detection in Android Systems Using Profile Hidden Markov Models
title_full Dynamic IoT Malware Detection in Android Systems Using Profile Hidden Markov Models
title_fullStr Dynamic IoT Malware Detection in Android Systems Using Profile Hidden Markov Models
title_full_unstemmed Dynamic IoT Malware Detection in Android Systems Using Profile Hidden Markov Models
title_short Dynamic IoT Malware Detection in Android Systems Using Profile Hidden Markov Models
title_sort dynamic iot malware detection in android systems using profile hidden markov models
topic cybersecurity
Internet of Things
Markov Model
Android
malware detection
url https://www.mdpi.com/2076-3417/13/1/557
work_keys_str_mv AT norahabanmi dynamiciotmalwaredetectioninandroidsystemsusingprofilehiddenmarkovmodels
AT hebakurdi dynamiciotmalwaredetectioninandroidsystemsusingprofilehiddenmarkovmodels
AT maialzamel dynamiciotmalwaredetectioninandroidsystemsusingprofilehiddenmarkovmodels