4 research outputs found
BarkDroid: Android Malware Detection Using Bark Frequency Cepstral Coefficients
Since their inaugural releases in 2007, Google’s Android and Apple’s iOS have grown to dominate the mobile OS market share. Currently, they jointly possess over 99% of the global market share with Android being the leading mobile Operating System of choice worldwide, controlling close to 70% of the market share. Mobile devices have enabled the exponential growth of a plethora of mobile applications that play key roles in enabling many use cases that are pivotal in our daily lives. On the other hand, access to a large pool of potential end users is available to both legitimate and nefarious applications, thus making mobile devices a burgeoning target of malicious applications. Current malware detection solutions rely on tedious, time-consuming, knowledge-based, and manual processes to identify malware. This paper presents BarkDroid, a novel Android malware detection technique that uses the low-level Bark Frequency Cepstral Coefficients audio features to detect malware. The results obtained outperform results obtained using other features on the same datasets. BarkDroid achieved 97.9% accuracy, 98.5% precision, an F1 score of 98.6%, and shorter execution times
Data Augmentation Based Malware Detection using Convolutional Neural Networks
Recently, cyber-attacks have been extensively seen due to the everlasting
increase of malware in the cyber world. These attacks cause irreversible damage
not only to end-users but also to corporate computer systems. Ransomware
attacks such as WannaCry and Petya specifically targets to make critical
infrastructures such as airports and rendered operational processes inoperable.
Hence, it has attracted increasing attention in terms of volume, versatility,
and intricacy. The most important feature of this type of malware is that they
change shape as they propagate from one computer to another. Since standard
signature-based detection software fails to identify this type of malware
because they have different characteristics on each contaminated computer. This
paper aims at providing an image augmentation enhanced deep convolutional
neural network (CNN) models for the detection of malware families in a
metamorphic malware environment. The main contributions of the paper's model
structure consist of three components, including image generation from malware
samples, image augmentation, and the last one is classifying the malware
families by using a convolutional neural network model. In the first component,
the collected malware samples are converted binary representation to 3-channel
images using windowing technique. The second component of the system create the
augmented version of the images, and the last component builds a classification
model. In this study, five different deep convolutional neural network model
for malware family detection is used.Comment: 18 page
Bot-IMG: A framework for image-based detection of Android botnets using machine learning
The file attached to this record is the author's final peer reviewed version.To enable more effective mitigation of Android botnets, image-based detection approaches offer great promise. Such image-based or visualization methods provide detection solutions that are less reliant on hand-engineered features which require domain knowledge. In this paper we propose Bot- IMG, a framework for visualization and image-based detection of Android botnets using machine learning. Furthermore, we evaluated the efficacy of Bot-IMG framework using the ISCX botnet dataset. In particular, we implement an image- based detection method using Histogram of Oriented Gradients (HOG) as feature descriptors within the framework, and utilized Autoencoders in conjunction with traditional machine learning classifiers. From the experiments performed, we obtained up to 95.3% classification accuracy using train-test split of 80:20 and 93.1% classification accuracy with 10-fold cross validation
A Novel Android Botnet Detection System Using Image-Based and Manifest File Features
open access articleMalicious botnet applications have become a serious threat and are increasingly incorporating sophisticated detection avoidance techniques. Hence, there is a need for more effective mitigation approaches to combat the rise of Android botnets. Although the use of Machine Learning to detect botnets has been a focus of recent research efforts, several challenges remain. To overcome the limitations of using hand-crafted features for Machine-Learning-based detection, in this paper, we propose a novel mobile botnet detection system based on features extracted from images and a manifest file. The scheme employs a Histogram of Oriented Gradients and byte histograms obtained from images representing the app executable and combines these with features derived from the manifest files. Feature selection is then applied to utilize the best features for classification with Machine-Learning algorithms. The proposed system was evaluated using the ISCX botnet dataset, and the experimental results demonstrate its effectiveness with F1 scores ranging from 0.923 to 0.96 using popular Machine-Learning algorithms. Furthermore, with the Extra Trees model, up to 97.5% overall accuracy was obtained using an 80:20 train–test split, and 96% overall accuracy was obtained using 10-fold cross validation