Android Malware Detection Using Machine Learning
Android Malware Detection Using Machine Learning
Abstract— Malware is one of the major issues regarding the Some recent survey has shown that there are about 2.1 million
operating system or in the software world. The android system is also android applications are there in the market. Due to increase
going through the same problems. We have seen other Signature- in usage of the android system has led to more rollout of
based malware detection techniques were used to detect malware. android malware. This malware is spreading in the market by
But the techniques were not able to detect unknown malware. the third parties developing applications. The Google android
Despite numerous detection and analysis techniques are there, the
detection accuracy of new malware is still a crucial issue. In this
market also doesn’t promise to guarantee that all the
paper, we study and highlight the existing detection and analysis applications listed are threat free. There are also such reports
methods used for the android malicious code. Along with studying, about Trojans applications that if downloaded, their malicious
we propose Machine learning algorithms that will be used to analyze code is also installed and cannot be easily detected by
such malware and also we will be doing semantic analysis. We will be Google’s technologies during publication in the Google
having a data set of permissions for malicious applications. Which android market. The android threats include banking Trojans,
will be compared with the permissions extracted from the application spyware, bots, root exploits, SMS fraud, phishing & fake
which we want to analyze. In the end, the user will be able to see how installer.
much malicious permission is there in the application and also we
analyze the application through comments.
II. OBJECTIVES
Authorized licensed use limited to: Indian Institute Of Technology (Banaras Hindu University) Varanasi. Downloaded on March 24,2024 at 10:04:24 UTC from IEEE Xplore. Restrictions apply.
2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE)
There are various ways and methods through malware or any the machine learning techniques to check whether it is a
malicious file can enter your system or application. Some of the malware or normal application. For validating their system they
common techniques of malware getting intruded into the system have collected 3258 samples of android apps and those have to
are as follows: - be extracted for every application, extract their features and
A. Penetration: have to train the models going to be evaluated with the help of
classification accuracy and time taken for the model.
Penetration techniques commonly used for malware
applications for installation activation & running on the android In literature[3], the paper was published in the year 2016. They
system are repackaging, updating and downloading. have proposed a Robotium program in an Android sandbox that
can trigger any android application automatically and monitor
B. Repackaging: its behavior. The program has a UI Identification automatic
trigger program that can click the mobile applications in a
It is among the common techniques for malware developers to meaningful order. The program was able to perform larger-
install malicious applications on an android scale experiments. They also tried to build a decision model
platform.Repackaging approach for popular applications and using behavior that has collected with the help of the random
misuse them as malware. The developer downloads such types forest algorithm. It has been able to determine whether the
of application and recodes them and adds their own malicious unknown application is malware and also shows its confidence
code and uploads that application to the official Android app value. They could store the result and also the confidence value
store or on the different markets. of the unknown apk file in their database.
C. Updating: In literature[4], the paper was published in the year 2018. They
have proposed the android malware detection system with the
This technique is much more difficult for detecting help of permissions, APIs, and also with the presence of
malware.The malware developer may still use repackaging but different key apps information such as, the dynamic code,
instead of encoding inflict code to the application the developer Reaction code, native code, cryptographic code, database, etc.
may include an update component that will able to download as the feature to train and build classification model just by
malicious code at the run time. using various machine learning techniques which can
automatically distinguish malicious Android apps(Malware)
D. Downloading: from the legitimate ones.
Authorized licensed use limited to: Indian Institute Of Technology (Banaras Hindu University) Varanasi. Downloaded on March 24,2024 at 10:04:24 UTC from IEEE Xplore. Restrictions apply.
2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE)
In the user-panel the user can see the select the category of the
application and can see its details like pricing description name.
User can see the malicious percentage of the application. And
the processed output of the semantic analysis will be displayed
to the user in the form of graph and the user will get a proper
review of the application.
In the above figure 2.1 & 2.2, we have shown the GUI of our
admin panel. Here the admin will fill the details of the particular
application and upload the apk file along with its image. The
permissions will be extracted from this apk file and will be
stored in the database.
In the above figure 2.3, we have shown the GUI of the user
panel, where the user will be able to see the applications genre
wise and can explore various applications according to its
requirements. Once the user selects particular genre, the user
will get list of various applications under that genre and once
the user clicks on particular application, the comments along
with semantic analysis result will we available to the user.
Authorized licensed use limited to: Indian Institute Of Technology (Banaras Hindu University) Varanasi. Downloaded on March 24,2024 at 10:04:24 UTC from IEEE Xplore. Restrictions apply.
2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE)
VII. RESULTS
IX. REFERENCES
Authorized licensed use limited to: Indian Institute Of Technology (Banaras Hindu University) Varanasi. Downloaded on March 24,2024 at 10:04:24 UTC from IEEE Xplore. Restrictions apply.