Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3565287.3617629acmconferencesArticle/Chapter ViewAbstractPublication PagesmobihocConference Proceedingsconference-collections
research-article
Public Access

Comparing Classifiers: A Look at Machine-Learning and the Detection of Mobile Malware in COVID-19 Android Mobile Applications

Published: 16 October 2023 Publication History

Abstract

The COVID-19 pandemic was a catalyst for many different trends in our daily life worldwide. While there has been an overall rise in cybercrime during this time, there has been relatively little research done about malicious COVID-19 themed AndroidOS applications. With the rise in reports of users falling victim to malicious COVID-19 themed AndroidOS applications, there is a need to learn about the detection of malware for pandemics-themed mobile apps. In this project, we extracted the permissions requests from 1959 APK files from a dataset containing benign and malware COVID-19 themed apps. We then created and compared eight unique models of four varying classifiers to determine their ability to identify potentially malicious APK files based on the permissions the APK file requests: support vector machine, neural network, decision trees, and categorical naive bayes. These classifiers were then trained using Synthetic Minority Oversampling Technique (SMOTE) to balance the dataset due to the lack of samples of malware compared to non-malware APKs. Finally, we evaluated the models using K-Fold Cross-Validation and found the decision tree classifier to be the best performing classifier.

References

[1]
Shaikh Bushra Almin and Madhumita Chatterjee. 2015. A novel approach to detect android malware. Procedia Computer Science 45 (2015), 407--417.
[2]
Brandon Amos, Hamilton Turner, and Jules White. 2013. Applying machine learning classifiers to dynamic android malware detection at scale. In 2013 9th international wireless communications and mobile computing conference (IWCMC) (IWCMC). IEEE, 1666--1641.
[3]
Nitesh V Chawla, Kevin W Bowyer, Lawrence O Hall, and W Philip Kegelmeyer. 2002. SMOTE: Synthetic Minority Over-sampling Technique. Journal of Artificial Intelligence Research 16 (2002), 321--357.
[4]
Raghad Khweiled, Mahmoud Jazzar, and Derar Eleyan. 2021. Cybercrimes during COVID -19 Pandemic. International Journal of Information Engineering Electronic Business 13, 2 (April 2021), 1--10.
[5]
Haoyu Wang Pengcheng Xia Yuanchun Li Lei Wu Yajin Zhou Xiapu Luo Yulei Sui Yao Guo Guoai Xu Liu Wang, Ren He. 2021. Beyond the virus: a first look at coronavirus-themed Android malware. Empirical Software Engineering 26, 4 (June 2021), 38.
[6]
Bernardi Pranggono and Abdullahi Arabo. 2020. COVID-19 pandemic cyber-security issues. Internet Technology Letters 4, 2 (October 2020), e247.
[7]
Borja Sanz, Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Pablo Garcia Bringas, and Gonzalo Álvarez. 2013. Puma: Permission usage to detect malware in android. In International joint conference CISIS'12-ICEUTE 12-SOCO 12 special sessions (Advances in Intelligent Systems and Computing). Springer, 289--298.
[8]
Dong-Jie Wu, Ching-Hao Mao, Te-En Wei, Hahn-Ming Lee, and Kuo-Ping Wu. 2012. Droidmat: Android malware detection through manifest and api calls tracing. In 2012 Seventh Asia joint conference on information security. IEEE, IEEE, 62--69.
[9]
Zhenlong Yuan, Yongqiang Lu, Zhaoguo Wang, and Yibo Xue. 2013. Droid-sec: deep learning in android malware detection. In Proceedings of the 2014 ACM conference on SIGCOMM (SIGCOMM). ACM, ACM, 371--372.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MobiHoc '23: Proceedings of the Twenty-fourth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing
October 2023
621 pages
ISBN:9781450399265
DOI:10.1145/3565287
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 16 October 2023

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. datasets
  2. machine learning
  3. neural networks
  4. COVID-19
  5. Android applications
  6. Android
  7. Malware

Qualifiers

  • Research-article

Funding Sources

Conference

MobiHoc '23
Sponsor:

Acceptance Rates

Overall Acceptance Rate 296 of 1,843 submissions, 16%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 74
    Total Downloads
  • Downloads (Last 12 months)41
  • Downloads (Last 6 weeks)13
Reflects downloads up to 01 Mar 2025

Other Metrics

Citations

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media