Android Antivirus Scanner by Analyzing Operation Codes

Article Preview

Abstract:

This research presents a model for malware detection on mobile operating system based on analyzing the operation codes. The research processes are as follows: (1) achieving of both malicious and benign codes on android operating system, (2) extracting features based on the distribution of n-grams frequency where the parameter n = 3 is used, and (3) constructing a model for classification the malicious codes using the extracted features for both malicious and benign codes. In the experiment, 304 malicious codes and 553 benign codes were using to construct the model. The experiment shows that the model achieved more than 85.52% accuracy. For the sensitivity and specificity, the model achieved 71.26% and 90.52%, respectively.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

145-148

Citation:

Online since:

August 2015

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Moskovitch, Robert, Yuval Elovici, and Lior Rokach. Detection of unknown computer worms based on behavioral classification of the host., Computational Statistics & Data Analysis 52, no. 9 (2008): 4544-4566.

DOI: 10.1016/j.csda.2008.01.028

Google Scholar

[2] Abou-Assaleh, Tony, Nick Cercone, Vlado Keselj, and Ray Sweidan. N-gram-based detection of new malicious code., In Computer Software and Applications Conference, 2004. COMPSAC 2004. Proceedings of the 28th Annual International, vol. 2, pp.41-42. IEEE, (2004).

DOI: 10.1109/cmpsac.2004.1342667

Google Scholar

[3] Kolter, Jeremy Z., and Marcus A. Maloof. Learning to detect malicious executables in the wild., Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, (2004).

DOI: 10.1145/1014052.1014105

Google Scholar

[4] Nolan, Godfrey. Decompiling Android. Apress, (2012).

Google Scholar

[5] Jolliffe, Ian. Principal component analysis. John Wiley & Sons, Ltd, (2005).

Google Scholar

[6] Maimon, Oded Z., and Lior Rokach, eds. Data mining and knowledge discovery handbook. Vol. 1. New York: Springer, (2005).

Google Scholar

[7] Kohavi, Ron. A study of cross-validation and bootstrap for accuracy estimation and model selection., In IJCAI, vol. 14, no. 2, pp.1137-1145. (1995).

Google Scholar