Permission-based Malware Detection in Android Devices REU fellow: Nadeen Saleh 1, Faculty mentor: Dr. Wenjia Li 2 Affiliation: 1. Florida Atlantic University,

Slides:



Advertisements
Similar presentations
Recognizing Human Actions by Attributes CVPR2011 Jingen Liu, Benjamin Kuipers, Silvio Savarese Dept. of Electrical Engineering and Computer Science University.
Advertisements

Particle swarm optimization for parameter determination and feature selection of support vector machines Shih-Wei Lin, Kuo-Ching Ying, Shih-Chieh Chen,
Secure Unlocking of Mobile Touch Screen Devices by Simple Gestures – You can see it but you can not do it Arjmand Samuel Microsoft Research Muhammad Shahzad.
AN IMPROVED AUDIO Jenn Tam Computer Science Dept. Carnegie Mellon University SOAPS 2008, Pittsburgh, PA.
Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R. O. Duda, P. E. Hart and D. G. Stork, John.
1 Abstract This paper presents a novel modification to the classical Competitive Learning (CL) by adding a dynamic branching mechanism to neural networks.
Predictive Automatic Relevance Determination by Expectation Propagation Yuan (Alan) Qi Thomas P. Minka Rosalind W. Picard Zoubin Ghahramani.
Supervised classification performance (prediction) assessment Dr. Huiru Zheng Dr. Franscisco Azuaje School of Computing and Mathematics Faculty of Engineering.
UPM, Faculty of Computer Science & IT, A robust automated attendance system using face recognition techniques PhD proposal; May 2009 Gawed Nagi.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
1 Homework  What’s important (i.e., this will be used in determining your grade): Finding features that make a difference You should expect to do some.
Text Classification Using Stochastic Keyword Generation Cong Li, Ji-Rong Wen and Hang Li Microsoft Research Asia August 22nd, 2003.
SMS Mobile Botnet Detection Using A Multi-Agent System Abdullah Alzahrani, Natalia Stakhanova, and Ali A. Ghorbani Faculty of Computer Science, University.
1 CSI5388 Data Sets: Running Proper Comparative Studies with Large Data Repositories [Based on Salzberg, S.L., 1997 “On Comparing Classifiers: Pitfalls.
CISC Machine Learning for Solving Systems Problems Presented by: Akanksha Kaul Dept of Computer & Information Sciences University of Delaware SBMDS:
A.C. Chen ADL M Zubair Rafique Muhammad Khurram Khan Khaled Alghathbar Muddassar Farooq The 8th FTRA International Conference on Secure and.
Attention Deficit Hyperactivity Disorder (ADHD) Student Classification Using Genetic Algorithm and Artificial Neural Network S. Yenaeng 1, S. Saelee 2.
Non-intrusive Energy Disaggregation using Signal Unmixing Undergraduate: Philip Wolfe Mentors: Alireza Rahimpour, Yang Song Professor: Dr. Hairong Qi Final.
A METHODOLOGY FOR EMPIRICAL ANALYSIS OF PERMISSION-BASED SECURITY MODELS AND ITS APPLICATION TO ANDROID.
* Hassan Khan,Aaron Atwater,and Urs Hengartner. Outline Background Introduction for IA Previous work on IA challenge Introduction to Itus Itus for app.
Biometric User Authentication on Mobile Devices through Gameplay REU fellow: Kirsten Giesbrecht 1, Faculty mentor: Dr. Jonathan Voris 2 Affiliation: 1.Centre.
Using Smartphones for Behavior Study of Individuals with Parkinson’s Disease REU fellows: Bruno Correa 1 and Yang Peng 2, Faculty mentor: Dr. Huanying.
AUTHORS: ASAF SHABTAI, URI KANONOV, YUVAL ELOVICI, CHANAN GLEZER, AND YAEL WEISS "ANDROMALY": A BEHAVIORAL MALWARE DETECTION FRAMEWORK FOR ANDROID.
Fuzzy Entropy based feature selection for classification of hyperspectral data Mahesh Pal Department of Civil Engineering National Institute of Technology.
Selective Block Minimization for Faster Convergence of Limited Memory Large-scale Linear Models Kai-Wei Chang and Dan Roth Experiment Settings Block Minimization.
Page 1 Ming Ji Department of Computer Science University of Illinois at Urbana-Champaign.
Partially Supervised Classification of Text Documents by Bing Liu, Philip Yu, and Xiaoli Li Presented by: Rick Knowles 7 April 2005.
Filter + Support Vector Machine for NIPS 2003 Challenge Jiwen Li University of Zurich Department of Informatics The NIPS 2003 challenge was organized to.
Automatic Image Annotation by Using Concept-Sensitive Salient Objects for Image Content Representation Jianping Fan, Yuli Gao, Hangzai Luo, Guangyou Xu.
Finding the Hidden Scenes Behind Android Applications Joey Allen Mentor: Xiangyu Niu CURENT REU Program: Final Presentation 7/16/2014.
BING: Binarized Normed Gradients for Objectness Estimation at 300fps
Greedy is not Enough: An Efficient Batch Mode Active Learning Algorithm Chen, Yi-wen( 陳憶文 ) Graduate Institute of Computer Science & Information Engineering.
Understanding User’s Query Intent with Wikipedia G 여 승 후.
CSKGOI'08 Commonsense Knowledge and Goal Oriented Interfaces.
Learning from Positive and Unlabeled Examples Investigator: Bing Liu, Computer Science Prime Grant Support: National Science Foundation Problem Statement.
Design of PCA and SVM based face recognition system for intelligent robots Department of Electrical Engineering, Southern Taiwan University, Tainan County,
Dense Color Moment: A New Discriminative Color Descriptor Kylie Gorman, Mentor: Yang Zhang University of Central Florida I.Problem:  Create Robust Discriminative.
Typing Pattern Authentication Techniques 3 rd Quarter Luke Knepper.
1 What Makes a Query Difficult? David Carmel, Elad YomTov, Adam Darlow, Dan Pelleg IBM Haifa Research Labs SIGIR 2006.
Web: ~ laoudias/pages/platform.htmlhttp://www2.ucy.ac.cy/ ~ laoudias/pages/platform.html
Competition II: Springleaf Sha Li (Team leader) Xiaoyan Chong, Minglu Ma, Yue Wang CAMCOS Fall 2015 San Jose State University.
Borja Sanz, Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero and Pablo Garcia Bringas The 9th Annual IEEE Consumer Communications and Networking Conference.
Identifying “Best Bet” Web Search Results by Mining Past User Behavior Author: Eugene Agichtein, Zijian Zheng (Microsoft Research) Source: KDD2006 Reporter:
Abstract Automatic detection of sleep state is an important queue in accurate detection of sleep conditions. The analysis of EEGs is a difficult time-consuming.
Predictive Automatic Relevance Determination by Expectation Propagation Y. Qi T.P. Minka R.W. Picard Z. Ghahramani.
Hybrid Ant Colony Optimization-Support Vector Machine using Weighted Ranking for Feature Selection and Classification.
October 20-23rd, 2015 Automatically Combining Static Malware Detection Techniques ir. David De Lille 1.
The Basics of Social Science Research Methods
Experience Report: System Log Analysis for Anomaly Detection
Learning to Detect and Classify Malicious Executables in the Wild by J
The Price of Free Privacy Leakage in Personalized Mobile In-App Ads
Android App Permission Manager
BotTracer: Bot User Detection Using Clustering Method in RecDroid
Evaluating Classifiers
Mobile Applications Applied to Information System
BotCatch: A Behavior and Signature Correlated Bot Detection Approach
Extra Tree Classifier-WS3 Bagging Classifier-WS3
Face Components detection
iSRD Spam Review Detection with Imbalanced Data Distributions
Your Poster Title Goes Here
Your Poster Title Goes Here
I Your Poster Title Here Author with credentials (use ANA format)
INSERT YOUR POSTER TITLE Author with credentials (use ANA format)
Dynamic Authentication of Typing Patterns
Your Poster Title Goes Here
Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation Binghui Wang, Jinyuan Jia, and Neil.
When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693.
Credit Card Fraudulent Transaction Detection
Austin Karingada, Jacob Handy, Adviser : Dr
Presentation transcript:

Permission-based Malware Detection in Android Devices REU fellow: Nadeen Saleh 1, Faculty mentor: Dr. Wenjia Li 2 Affiliation: 1. Florida Atlantic University, 2. School of Engineering and Computing Sciences, NYIT NYIT Research Experience for Undergraduates (REU) May 26 – July 30, 2015 Abstract Android, the most popular mobile operating system of our day, endures the largest deal of exploitation efforts by malware authors. While models with large overhead have been proposed to secure oneself from the harms of malware, a simple and fast do-it-yourself method has yet to be widely distributed. This project proposes a method of malware detection that will add a lightweight layer of protection to any Android device. Methodology We conducted a manual detection for outliers in our training set samples - 50 benign and 50 malicious applications. We weight three features from the data; (1) total permissions per application, (2) the occurrence of duplicate permissions in a single manifest, (3) permissions that are highly prevalent in our malware training set (e.g. SEND SMS malware training set 46% presence, benign training sample 6% presence). To obtain the best results, our classifier must be fed meaningful information that is justified by their distinguishable nature. In choosing, distributing and weighting our features it was important to note permissions with a significant or sole presence in our malware training set, concluding to consider those over a 100% percent-increase in Figure B. In optimizing the point system, the threshold value of 5 resulted in the highest accuracy. Experimental results Discussion To estimate the performance of a predictive model (SVM) and validate our feature selection, we collected preliminary results from the whole-number point system. Our algorithm was run with different weights and category distributions, with a final and finest accuracy of 78.9%. To cross-validate our method, we use the Support Vector Machine machine learning algorithm on our training set. This supervised learning method accurately identified 79% of instances. The advantage of our model is its convenience. Our method makes use of 3 features and 13 permissions to amount to a conclusion. Any Android user with access to an apktool and basic knowledge of the command line can decompile their apk file (distribution is very accessible, in contrast to iOS applications), locate the manifest file, and determine for themselves if their application has malicious intent. References [1] G. Kelly, “Report: 97% of mobile malware is on android. this is the easy way you stay safe,” [2] O. Hou, “A look at google bouncer,” Figure A. Android malware by app store [1] Figure B. Training set comparison Acknowledgement The project is funded by National Science Foundation Grant number CNS and New York Institute of Technology. Future Work In regards to feature selection, identifying more distinguishable features in a small training set (such as this one) can be challenging. Future works have the ability to test the performance of different parameters, more importantly, a wider and relevant feature selection. For comparison purposes, we tested the performance of fewer parameters to establish a correlation with accuracy, and as anticipated, saw a qualified decrease in accuracy.