Abstract
Mobile malware poses undoubtedly a major threat to the continuously increasing number of mobile users worldwide. While researchers have been trying vigorously to find optimal detection solutions, mobile malware is becoming more sophisticated and its writers are getting more and more skilled in hiding malicious code. In this paper, we examine the usefulness of two known dimensionality reduction transformations namely, Principal Component Analysis (PCA) and t-distributed stochastic neighbor embedding (t-SNE) in malware detection. Starting from a large set of base prominent classifiers, we study how they can be combined to build an accurate ensemble. We propose a simple ensemble aggregated base model of similar feature type as well as a complex ensemble that can use multiple and possibly heterogeneous base models. The experimental results in contemporary Androzoo benchmark corpora verify the suitability of ensembles for this task and clearly demonstrate the effectiveness of our method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Papamartzivanos, D., Damopoulos, D., Kambourakis, G.: A cloud-based architecture to crowdsource mobile app privacy leaks. In: Proceedings of the 18th Panhellenic Conference on Informatics, PCI 2014, pp. 1–6. Association for Computing Machinery, New York, NY, USA (2014)
Damopoulos, D., Kambourakis, G., Gritzalis, S., Park, S.O.: Exposing mobile malware from the inside (or what is your mobile app really doing?). Peer Peer Netw. Appl. 7(4), 687–697 (2014). https://doi.org/10.1007/s12083-012-0179-x. https://doi.org/10.1007/s12083-012-0179-x
Damopoulos, D., Kambourakis, G., Anagnostopoulos, M., Gritzalis, S., Park, J.H.: User privacy and modern mobile services: are they on the same path? Pers. Ubiquitous Comput. 17(7), 1437–1448 (2013) https://doi.org/10.1007/s00779-012-0579-1. https://doi.org/10.1007/s00779-012-0579-1
Mobile OS market share (2020). https://gs.statcounter.com/os-market-share/mobile/worldwide. Accessed 10 Sep 2020
Smartphone market share (2020). https://www.idc.com/promo/smartphone-market-share/os. Accessed 10 Sep 2020
Mcafee mobile threat report 2020 (2020). https://www.mcafee.com/content/dam/consumer/en-us/docs/2020-Mobile-Threat-Report.pdf. Accessed 10 Sep 2020
Contagio. http://contagiominidump.blogspot.com/. Accessed 10 Sep 2020
Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: Proceedings of the 33rd IEEE Symposium on Security and Privacy, vol. 12, no. 7 (2012)
Arp, D., Spreitzenbarth, M., Huebner, M., Gascon, H., Rieck, K.: Drebin: efficient and explainable detection of android malware in your pocket. In: 21th Annual Network and Distributed System Security Symposium (NDSS), vol. 12, no. (7), p. 1128 (2014)
Author. Details withheld to preserve blind review. anonymized
Yan, P., Yan, Z.: A survey on dynamic mobile malware detection. Software Qual. J. 26, 891–919 (2018)
Souri, A., Hosseini, R.: A state-of-the-art survey of malware detection approaches using data mining technique. Hum.-Centric Comput. Inf. Sci. 8, 3 (2018)
Odusami, M., Abayomi-Alli, O., Misra, S., Shobayo, O., Damasevicius, R., Maskeliunas, R.: Android malware detection: a survey. In: Florez, H., Diaz, C., Chavarriaga, J. (eds.) ICAI 2018. CCIS, vol. 942, pp. 255–266. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-01535-0_19
Narudin, F.A., Feizollah, A., Anuar, N.B., Gani, A.: Evaluation of machine learning classifiers for mobile malware detection. Soft. Comput. 20, 343–357 (2016)
Allix, K., Bissyandé F, T., Klein, J., Le Traon, Y.: Androzoo: collecting millions of android apps for the research community. In: Proceedings of the 13th International Conference on Mining Software Repositories, MSR 2016, pp. 468–471. ACM (2016)
Author. Details withheld to preserve blind review
Ali-Gombe, I., Saltaformaggio, B., Ramanujam, J.R., Xu, D., Richard, G.G.: Toward a more dependable hybrid analysis of android malware using aspect-oriented programming. Comput. Secur. 73, 235–248 (2018)
Arshad, S., Shah, M.A., Wahid, A., Mehmood, A., Song, H., Samadroid, H.Y.: A novel 3-level hybrid malware detection model for android operating system. IEEE Access 6, 4321–4339 (2018)
Xu, L., Zhang, D., Jayasena, N., Cavazos, J.: HADM: hybrid analysis for detection of malware. In: Bi, Y., Kapoor, S., Bhatia, R. (eds.) IntelliSys 2016. LNNS, vol. 16, pp. 702–724. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-56991-8_51
Fang, Q., Yang, X., Ji, C.: A hybrid detection method for android malware. In: 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), pp. 2127–2132 (2019)
Kouliaridis, V., Kambourakis, G., Geneiatakis, D., Potha, N.: Two anatomists are better than one-dual-level android malware detection. Symmetry 12(7), 1128 (2020)
Martinelli, F., Mercaldo, F., Saracino, A.: BrideMaid: an hybrid tool for accurate detection of android malware. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (2017)
Surendran, R., Thomas, T., Emmanuel, S.: SamaDroid: a tan based hybrid model for android malware detection. J. Inf. Secur. Appl. 54, 102483 (2020)
Vega Vega, R., Quintián, H., Calvo-Rolle, J., Álvaro, H., Corchado, E.: Gaining deep knowledge of Android malware families through dimensionality reduction techniques. Logic J. IGPL 27(2), 160–176 (2018)
Deerwester, S., Dumais, S.T., Furnas, G.W., Landauer, T.K., Harshman, R.: Indexing by latent semantic analysis. J. Am. Soc. Inf. Sci. 41(6), 391–407 (1990)
Bunte, K., Biehl, M., Hammer, B.: A general framework for dimensionality-reducing data visualization mapping. Neural Comput. 24(3), 771–804 (2012)
Google play. https://play.google.com/. Accessed 10 Sep 2020
Fawcett, T.: An introduction to ROC analysis. Pattern Recogn. Lett. 27(8), 861–874 (2006)
Milosevic, N., Dehghantanha, A., Choo, K.K.R.: Machine learning aided android malware classification. Comput. Electr. Eng. 61, 266–274 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Kouliaridis, V., Potha, N., Kambourakis, G. (2021). Improving Android Malware Detection Through Dimensionality Reduction Techniques. In: Renault, É., Boumerdassi, S., Mühlethaler, P. (eds) Machine Learning for Networking. MLN 2020. Lecture Notes in Computer Science(), vol 12629. Springer, Cham. https://doi.org/10.1007/978-3-030-70866-5_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-70866-5_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-70865-8
Online ISBN: 978-3-030-70866-5
eBook Packages: Computer ScienceComputer Science (R0)