Abstract
Smart devices are gradually becoming indispensable in people’s daily lives, and Android-based smart devices are taking over the main stream in mobile devices. However, while Android smart devices bring convenience to customers, they also bring problems. Due to the open-sourced nature of the Android system, malicious programs and software attacks pose a significant security risk to user data. Therefore, the detection of malware has always been a critical issue. For a long time, various malware detection schemes have been proposed, which have gradually improved the detection of malware. Traditional detection methods are based on static or dynamic detection techniques. In recent years, with the advancement of technology, malware detection based on machine learning ideas has been widely used, such as K-NN, deep learning, decision trees, and so on. Blockchain has been widely used in many fields since its birth. This paper combines traditional detection methods and ensemble learning algorithms to propose a malware detection technology based on QuorumChain framework (blockchain technology). The experimental results verify that the proposed new model is better than other models in precision, recall and f1-measure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
IDC.COM: Smartphone market share. https://www.idc.com/promo/smartphone-market-share/os. Accessed 30 June 2019
National Computer Network Emergency Technical Processing Coordination Center. Specification for mobile internet malicious code, YD/T 2439 (2012)
Chen, K., Wang, P., Lee, Y., Wang, X., Zhang, N., Huang, H., et al.: Finding unknown malice in 10 seconds: mass vetting for new threats at the Google-play scale. In: Usenix Conference on Security Symposium. USENIX Association (2015)
Zhang, M., Duan, Y., Yin, H., Zhao, Z.: Semantics-aware Android malware classification using weighted contextual API dependency graphs (2014)
Xiao, X., Xiao, X., Jiang, Y., Liu, X., Ye, R.: Identifying Android malware with system call co-occurrence matrices. Trans. Emerg. Telecommun. Technol. 27(5), 675–684 (2016)
Di Cerbo, F., Girardello, A., Michahelles, F., Voronkova, S.: Detection of malicious applications on Android OS. In: Sako, H., Franke, K.Y., Saitoh, S. (eds.) IWCF 2010. LNCS, vol. 6540, pp. 138–149. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19376-7_12
Fuchs, A.P., Chaudhuri, A., Foster, J.S.: SCanDroid: automated security certification of Android applications (2009)
Shang, F., Li, Y., Deng, X., He, D.: Android malware detection method based on Naive Bayes and permission correlation algorithm. Cluster Comput. 21(8), 1–12 (2017)
Li, Y., Shen, T., Sun, X., Pan, X., Miao, B.: Detection, classification and characterization of Android malware using API data dependency. In: Thuraisingham, B., Wang, X., Yegneswaran, V. (eds.) SecureComm 2015. LNCS, vol. 164, pp. 23–40. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-28865-9_2
Bhatia, T., Kaushal, R.: Malware detection in Android based on dynamic analysis. In: 2017 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). IEEE (2017)
Enck, W., Gilbert, P.: TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones. In: Proceedings of the Usenix Symposium on Operating System Design and Implementation, OSDI, Vancouver, BC, Canada, 4–6 October 2010, pp. 393–407. DBLP (2010)
Bläsing, T., Batyuk, L., Schmidt, A.D., Camtepe, S.A., Albayrak, S.: An Android application sandbox system for suspicious software detection. In: 2010 5th International Conference on Malicious and Unwanted Software (MALWARE). IEEE (2010)
Su, M.Y., Fung, K.T., Huang, Y.H., Kang, M.Z., Chung, Y.H.: Detection of Android malware: combined with static analysis and dynamic analysis. In: 2016 International Conference on High Performance Computing & Simulation (HPCS). IEEE (2016)
Yuan, Z., Lu, Y., Xue, Y.: Droiddetector: Android malware characterization and detection using deep learning. Tsinghua Sci. Technol. 21(1), 114–123 (2016)
Zhang, X., Hu, D., Fan, Y., Yu, K.: A novel Android malware detection method based on Markov blanket. In: IEEE International Conference on Data Science in Cyberspace. IEEE (2016)
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf 《Consulted》
Di Pierro, M.: What is the blockchain? IEEE Comput. Sci. Eng. 19, 92–95 (2017)
Puthal, D., Malik, N.: The blockchain as a decentralized security framework [future directions]. IEEE Consum. Electron. Mag. 7(2), 18–21 (2018)
Thomas, G.D.: Machine learning research: four current directions. AI Mag. 18(4), 97–136 (1997)
Zhihua, Z.: Machine Learning (Chinese Edition), pp. 171–191. Tsinghua University Press, Beijing (2016)
Cummins, M., Newman, P.: Probabilistic appearance based navigation and loop closing. In: IEEE International Conference on Robotics & Automation. IEEE (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Gao, F., Jiang, F., Zhang, Y., Doss, R. (2019). Quorum Chain-Based Malware Detection in Android Smart Devices. In: Doss, R., Piramuthu, S., Zhou, W. (eds) Future Network Systems and Security. FNSS 2019. Communications in Computer and Information Science, vol 1113. Springer, Cham. https://doi.org/10.1007/978-3-030-34353-8_16
Download citation
DOI: https://doi.org/10.1007/978-3-030-34353-8_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-34352-1
Online ISBN: 978-3-030-34353-8
eBook Packages: Computer ScienceComputer Science (R0)