Malware Detection: A Framework for Reverse Engineered Android Applications Through Machine Learning Algorithms

Today, Android is one of the most used operating systems in smartphone technology. This is the main reason, Android has become the favorite target for hackers and attackers. Malicious codes are being embedded in Android applications in such a sophisticated manner that detecting and identifying an ap...

Full description

Bibliographic Details
Main Authors: Beenish Urooj, Munam Ali Shah, Carsten Maple, Muhammad Kamran Abbasi, Sidra Riasat
Format: Article
Language:English
Published: IEEE 2022-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9703375/
_version_ 1811188528215752704
author Beenish Urooj
Munam Ali Shah
Carsten Maple
Muhammad Kamran Abbasi
Sidra Riasat
author_facet Beenish Urooj
Munam Ali Shah
Carsten Maple
Muhammad Kamran Abbasi
Sidra Riasat
author_sort Beenish Urooj
collection DOAJ
description Today, Android is one of the most used operating systems in smartphone technology. This is the main reason, Android has become the favorite target for hackers and attackers. Malicious codes are being embedded in Android applications in such a sophisticated manner that detecting and identifying an application as a malware has become the toughest job for security providers. In terms of ingenuity and cognition, Android malware has progressed to the point where they’re more impervious to conventional detection techniques. Approaches based on machine learning have emerged as a much more effective way to tackle the intricacy and originality of developing Android threats. They function by first identifying current patterns of malware activity and then using this information to distinguish between identified threats and unidentified threats with unknown behavior. This research paper uses Reverse Engineered Android applications’ features and Machine Learning algorithms to find vulnerabilities present in Smartphone applications. Our contribution is twofold. Firstly, we propose a model that incorporates more innovative static feature sets with the largest current datasets of malware samples than conventional methods. Secondly, we have used ensemble learning with machine learning algorithms i.e., AdaBoost, Support Vector Machine (SVM), etc. to improve our model’s performance. Our experimental results and findings exhibit 96.24% accuracy to detect extracted malware from Android applications, with a 0.3 False Positive Rate (FPR). The proposed model incorporates ignored detrimental features such as permissions, intents, Application Programming Interface (API) calls, and so on, trained by feeding a solitary arbitrary feature, extracted by reverse engineering as an input to the machine.
first_indexed 2024-04-11T14:21:28Z
format Article
id doaj.art-a5a895b0b7e7443fb18391700839062a
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-04-11T14:21:28Z
publishDate 2022-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-a5a895b0b7e7443fb18391700839062a2022-12-22T04:19:04ZengIEEEIEEE Access2169-35362022-01-0110890318905010.1109/ACCESS.2022.31490539703375Malware Detection: A Framework for Reverse Engineered Android Applications Through Machine Learning AlgorithmsBeenish Urooj0https://orcid.org/0000-0002-5814-7270Munam Ali Shah1https://orcid.org/0000-0002-4037-3405Carsten Maple2https://orcid.org/0000-0002-4715-212XMuhammad Kamran Abbasi3Sidra Riasat4https://orcid.org/0000-0003-4788-4627Department of Computer Science, COMSATS University Islamabad, Islamabad, PakistanDepartment of Computer Science, COMSATS University Islamabad, Islamabad, PakistanWMG, University of Warwick, Coventry, U.K.Department of Distance Continuing and Computer Education, University of Sindh, Hyderabad, PakistanDepartment of Computer Science, COMSATS University Islamabad, Islamabad, PakistanToday, Android is one of the most used operating systems in smartphone technology. This is the main reason, Android has become the favorite target for hackers and attackers. Malicious codes are being embedded in Android applications in such a sophisticated manner that detecting and identifying an application as a malware has become the toughest job for security providers. In terms of ingenuity and cognition, Android malware has progressed to the point where they’re more impervious to conventional detection techniques. Approaches based on machine learning have emerged as a much more effective way to tackle the intricacy and originality of developing Android threats. They function by first identifying current patterns of malware activity and then using this information to distinguish between identified threats and unidentified threats with unknown behavior. This research paper uses Reverse Engineered Android applications’ features and Machine Learning algorithms to find vulnerabilities present in Smartphone applications. Our contribution is twofold. Firstly, we propose a model that incorporates more innovative static feature sets with the largest current datasets of malware samples than conventional methods. Secondly, we have used ensemble learning with machine learning algorithms i.e., AdaBoost, Support Vector Machine (SVM), etc. to improve our model’s performance. Our experimental results and findings exhibit 96.24% accuracy to detect extracted malware from Android applications, with a 0.3 False Positive Rate (FPR). The proposed model incorporates ignored detrimental features such as permissions, intents, Application Programming Interface (API) calls, and so on, trained by feeding a solitary arbitrary feature, extracted by reverse engineering as an input to the machine.https://ieeexplore.ieee.org/document/9703375/Android applicationsbenignfeature extractionmalware detectionreverse engineeringmachine learning
spellingShingle Beenish Urooj
Munam Ali Shah
Carsten Maple
Muhammad Kamran Abbasi
Sidra Riasat
Malware Detection: A Framework for Reverse Engineered Android Applications Through Machine Learning Algorithms
IEEE Access
Android applications
benign
feature extraction
malware detection
reverse engineering
machine learning
title Malware Detection: A Framework for Reverse Engineered Android Applications Through Machine Learning Algorithms
title_full Malware Detection: A Framework for Reverse Engineered Android Applications Through Machine Learning Algorithms
title_fullStr Malware Detection: A Framework for Reverse Engineered Android Applications Through Machine Learning Algorithms
title_full_unstemmed Malware Detection: A Framework for Reverse Engineered Android Applications Through Machine Learning Algorithms
title_short Malware Detection: A Framework for Reverse Engineered Android Applications Through Machine Learning Algorithms
title_sort malware detection a framework for reverse engineered android applications through machine learning algorithms
topic Android applications
benign
feature extraction
malware detection
reverse engineering
machine learning
url https://ieeexplore.ieee.org/document/9703375/
work_keys_str_mv AT beenishurooj malwaredetectionaframeworkforreverseengineeredandroidapplicationsthroughmachinelearningalgorithms
AT munamalishah malwaredetectionaframeworkforreverseengineeredandroidapplicationsthroughmachinelearningalgorithms
AT carstenmaple malwaredetectionaframeworkforreverseengineeredandroidapplicationsthroughmachinelearningalgorithms
AT muhammadkamranabbasi malwaredetectionaframeworkforreverseengineeredandroidapplicationsthroughmachinelearningalgorithms
AT sidrariasat malwaredetectionaframeworkforreverseengineeredandroidapplicationsthroughmachinelearningalgorithms