Mobile Malware Classification

  • Authors

    • Zolidah Kasiran
    • Norkhushaini Awang
    • Fatin Nurhanani Rusli
    2018-12-09
    https://doi.org/10.14419/ijet.v7i4.31.23369
  • Classification, K-means, Malware, Mobile Malware
  • Android malware is growing in such an exponential pace which lead to the need of an efficient malware intrusion  detection technique. The single approach of clustering or classification technique in malware intrusion detection yield to high negative positive alarm rate.. This project had proposed clustering in intrusion detection method using hybrid learning approaches combining K-Means clustering and Naïve Bayes classification had been proposed.  The result had shown the improved false rate alarm in malware detection.

     

     

  • References

    1. [1] Wang, X., Yang, Y., & Zeng, Y. Accurate Mobile Malware Detection and Classification in the Cloud. SpringerPlus, 2015; 4(1), pp583

      [2] S Anwar, M F Zolkipli , Z Inayat, J Odili , M Ali & J M Zain, Android Botnets: A Serious Threat to Android Devices, Pertanika Journal Sci. & Technology ,2018; 26 (1) pp 37 - 70

      [3] Le Thanh, H.†Analysis of Malware Families on Android Mobiles: Detection Characteristics Recognizable by Ordinary Phone Users and How to Fix It†. Journal of Information Security,2013; 4(October), pp213–224.

      [4] Wankhade, K., Patka, S., & Thool, R. “An Efficient Approach for Intrusion Detection Using Data Mining Methods†International Conference on Advances in Computing, Communications and Informatics (ICACCI) 2013;pp 1615–1618.

      [5] Sitaram, D. â€Intrusion Detection System for High Volume and High Velocity Packet Streams: A Clustering Approach.†International Journal of Innovation, Management and Technology,2013; 4(5).

      [6] Emami, Y., Ahmadzadeh, M., Salehi, M., & Homayoun, S. “Efficient Intrusion Detection using Weighted K-means Clustering and Naïve Bayes Classification.†Journal of Emerging Trends in Computing and Information Sciences, 2014;5(8),pp 620–623.

      [7] Chandramohan, M., Tan, H. B. K., & Shar, L. K. “Scalable malware clustering through coarse-grained behavior modeling.†Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering,2012; pp 27.

      [8] Muda, Z., Yassin, W., Sulaiman, M. N., Udzir, N. I., Technology, I., & Ehsan, S. D. “K-Means Clustering and Naive Bayes Classification for Intrusion Detection.†Journal of IT in Asia, 2014; 4(1) pp 13-25.

      [9] Zhong, Y., Yamaki, H., & Takakura, H. “A grid-based clustering for low-overhead anomaly intrusion detection. “5th International Conference on Network and System Security,2011; pp 17–24.

      [10] Christopher, O., Comfort, D., & James, A. (2014). An Intrusion Detection System for the Android Mobile Enterprise, IJCSI International Journal of Computer Science Issues, 2014; 11(3), pp 161–166.

      [11] Singh, G., Patrick, A., & Rajpoot, L.†A Clustering based Intrusion Detection System for Storage Area Network. “International Journal of Computer Applications, 2014; 88(9), pp 14–18.

      [12] Elssied, N. O. F., & Ibrahim, O.†K-Means Clustering Scheme for Enhanced Spam Detection.†Research Journal of Applied Sciences, Engineering and Technology, 2014;7(10), pp 1940–1952.

      [13] Aiman A. A.S, Kangbin Y,Osama A.G. “ Analysis of Clustrering Technique in Android Malware Detection.†7th International Conference on Innovative Mobile and Internet in Ubiquitious Computing,2013;pp 729-733

      [14] Ali F, Badrul A.N, Rosli S, Fairuz, A. “Comparative Study of K-means and Mini Batch K-means Clustering Algorithms in Android Malware Detection Using Network Traffic Analysis†International Symposium on Biometrics and Security Technologies (ISBAST),2014; pp 193-197

      [15] Apvrille L and Apvrille A,†Identifying Unknown Android Malware with Feature Extraction and Classification Techniques.†IEEE Trustcom/BigDataSE/ISPA, 2015; pp 182-189

      [16] Wei C, David A,Andrew D.G, Charles S, Igor M. “More Semantics More Robust: Improving Android Malware classifiers, 9th ACM Conference on Security & Privacy in Wireless and Mobile Networksâ€2016; pp 147-158

      [17] Suyash J, Tae T,Jaehoon J,Young H K, Jeong N K. “More Semantics More Robust: Improving Android Malware Classifiers,†31st International Conference on Advanced Information Networking and Application Workshops, 2017;pp 370-374

      [18] Anuar, N. B., Sallehudin, H., Gani, A., & Zakari, O. †Identifying False Alarm for Network Intrusion Detection System using Hybrid Data Mining and Decision Tree,â€Malaysian Journal Of Computer Science, 2008; 21(2), pp 101–115.

      [19] Zaki, M., Sahib, S., Abdollah, M. F., Selamat, S. R., & Yusof, R. “Analysis of Features Selection and Machine Learning Classifier in Android Malware Detection†International Conference on Information Science and Applications (ICISA), 2014; pp 1-5

  • Downloads

  • How to Cite

    Kasiran, Z., Awang, N., & Nurhanani Rusli, F. (2018). Mobile Malware Classification. International Journal of Engineering & Technology, 7(4.31), 209-2013. https://doi.org/10.14419/ijet.v7i4.31.23369