2828 1324
Full Length Article
Journal of Cybersecurity and Information Management
Volume 3 , Issue 2, PP: 42-52 , 2020 | Cite this article as | XML | Html |PDF

Title

PARUDroid: Validation of Android Malware Detection Dataset

  Arvind Mahindru 1 * ,   A.L. Sangal 2

1  Department of Computer Science & Engineering, Dr. B.R. Ambedkar National Institute of Technology Jalandhar 144001, India and Department of Computer Science & Applications, D.A.V. University, Sarmastpur, Jalandhar 144001, India
    (er.arvindmahindru@gmail.com)

2  Department of Computer Science & Engineering, Dr. B.R. Ambedkar National Institute of Technology Jalandhar 144001, India
    (A.L.Sangal@gmail.com)


Doi   :   https://doi.org/10.54216/JCIM.030202

Received: Feb 1 2020; Revised: April 5 2020; Accepted: April 28 2020

Abstract :

Android has gained its popularity due to its open nature and number of free apps in its play store. Till date, Android has captured 87% of the total market share. 2.8 million apps are present in the official market of Android. Android apps depend upon permissions for its proper functioning. This dataset contains distinct 5,60,142 Android apps that belong to thirty different categories. These Android application packages (.apk) is collected from Google-play store and other promised repositories. In this study, we performed a dynamic analysis of these collected .apk packages and extracted features, i.e., PARU (Permissions, API calls, Rating of an app, and Users download the app). As per the knowledge, this is the first dataset that extracted features by using the Android 6.0 (API 23) version as an Android operating system. The paper discusses the potential usefulness of the dataset for future research in the field of cybersecurity. Further, to check the potential of our dataset, in this research paper malware detection model is developed by using five different classification machine-learning algorithms. Experiment result reveals that model developed using Deep Neural Network (DNN) can able to detect 98.8% malware-infected apps. Dataset URL: http://dx.doi.org/10.17632/mg5c8jxbhm.2

Keywords :

Android apps , Permissions model , API calls , Intrusion detection , Cyber security , Smartphone

References :

 

[1] Anderson, Hyrum S., and Phil Roth. “Ember: an open dataset for training static pe malware machine learning models.” arXiv preprint arXiv:1804.04637 (2018).

[2] Mahindru, Arvind, and Paramvir Singh. “Dynamic permissions based android malware detection using machine learning techniques.” In Proceedings of the 10th innovations in Software Engineering Conference, 2017. pp. 202-210.

[3] Kadir, Andi Fitriah Abdul, Natalia Stakhanova, and Ali Akbar Ghorbani. “Android botnets: What urls are telling us.” In International Conference on Network and System Security, Springer, Cham, 2015. pp. 78-91.

[4] Zhou, Yajin, and Xuxian Jiang. “Dissecting android malware: Characterization and evolution.” In 2012 IEEE symposium on security and privacy, IEEE, 2012. pp. 95-109.

[5] Mahindru, Arvind, and A. L. Sangal. “PerbDroid: Effective Malware Detection Model Developed Using Machine Learning Classification Techniques.” In A Journey Towards Bio-inspired Techniques in Software Engineering, Springer, Cham, 2020. pp. 103-139.

[6] Mahindru, Arvind, and A. L. Sangal. “Feature-Based Semi-supervised Learning to Detect Malware from Android.” In Automated Software Engineering: A Deep Learning-Based Approach, Springer, Cham, 2020. pp. 93-118.

[7] Zhou, Yajin, and Xuxian Jiang. “Dissecting android malware: Characterization and evolution.” In 2012 IEEE symposium on security and privacy, IEEE, 2012. pp. 95-109.

[8] Wei, Fengguo, Yuping Li, Sankardas Roy, Xinming Ou, and Wu Zhou. “Deep ground truth analysis of current android malware.” In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Springer, Cham, 2017. pp. 252-276.

[9] Allix, Kevin, Tegawend´e F. Bissyand´e, Jacques Klein, and Yves Le Traon. “Androzoo: Collecting millions of android apps for the research community.” In 2016 IEEE/ACM 13th Working Conference on Mining Software Repositories (MSR), IEEE, 2016. pp. 468-471.

[10] Lindorfer, Martina, Matthias Neugschwandtner, Lukas Weichselbaum, Yanick Fratantonio, Victor Van Der Veen, and Christian Platzer. “Andrubis–1,000,000 apps later: A view on current Android malware behaviors.” In 2014 third international workshop on building analysis datasets and gathering experience returns for security (BADGERS), IEEE, 2014. pp. 3-17.

[11] Mahindru, Arvind, and A. L. Sangal. “DLDroid: Feature Selection based Malware Detection Framework for Android Apps developed during COVID-19”. International Journal on Emerging Technologies, 11(3), 2020. pp. 516-525.

[12] Mahindru, Arvind, and A. L. Sangal. “GADroid: A framework for Malware Detection from Android by using Genetic Algorithm as Feature Selection approach”. International Journal of Advanced Science and Technology, Vol. 29, No. 5, 2020. pp. 5532 - 5543

[13] Zarni Aung,Win Zaw. “Permission-based android malware detection.” International Journal of Scientific & Technology Research 2, no. 3, 2013. pp. 228-234.

[14] Amos, Brandon, Hamilton Turner, and Jules White. “Applying machine learning classifiers to dynamic android malware detection at scale.” In 2013 9th international wireless communications and mobile computing conference (IWCMC), IEEE, 2013. pp. 1666-1671.

[15] Yu, Wei, Hanlin Zhang, Linqiang Ge, and Rommie Hardy. “On behavior-based detection of malware on android platform.” In 2013 IEEE global communications conference (GLOBECOM), IEEE, 2013. pp. 814-819.

[16] Alam, Mohammed S., and Son T. Vuong. “Random forest classification for detecting android malware.” In 2013 IEEE international conference on green computing and communications and IEEE Internet of Things and IEEE cyber, physical and social computing, IEEE, 2013. pp. 663-669.

[17] Zarni Aung,Win Zaw. “Permission-based android malware detection.” International Journal of Scientific & Technology Research 2, no. 3, 2013. pp. 228-234.

[18] Yuan, Zhenlong, Yongqiang Lu, and Yibo Xue. “Droiddetector: android malware characterization and detection using deep learning.” Tsinghua Science and Technology 21, no. 1, 2016. pp. 114-123.

[19] Mahindru, Arvind, and A. L. Sangal. “DeepDroid: Feature Selection approach to detect Android malware using Deep Learning.” In 2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS), IEEE, 2019. pp. 16-19.


Cite this Article as :
Style #
MLA Arvind Mahindru, A.L. Sangal. "PARUDroid: Validation of Android Malware Detection Dataset." Journal of Cybersecurity and Information Management, Vol. 3, No. 2, 2020 ,PP. 42-52 (Doi   :  https://doi.org/10.54216/JCIM.030202)
APA Arvind Mahindru, A.L. Sangal. (2020). PARUDroid: Validation of Android Malware Detection Dataset. Journal of Journal of Cybersecurity and Information Management, 3 ( 2 ), 42-52 (Doi   :  https://doi.org/10.54216/JCIM.030202)
Chicago Arvind Mahindru, A.L. Sangal. "PARUDroid: Validation of Android Malware Detection Dataset." Journal of Journal of Cybersecurity and Information Management, 3 no. 2 (2020): 42-52 (Doi   :  https://doi.org/10.54216/JCIM.030202)
Harvard Arvind Mahindru, A.L. Sangal. (2020). PARUDroid: Validation of Android Malware Detection Dataset. Journal of Journal of Cybersecurity and Information Management, 3 ( 2 ), 42-52 (Doi   :  https://doi.org/10.54216/JCIM.030202)
Vancouver Arvind Mahindru, A.L. Sangal. PARUDroid: Validation of Android Malware Detection Dataset. Journal of Journal of Cybersecurity and Information Management, (2020); 3 ( 2 ): 42-52 (Doi   :  https://doi.org/10.54216/JCIM.030202)
IEEE Arvind Mahindru, A.L. Sangal, PARUDroid: Validation of Android Malware Detection Dataset, Journal of Journal of Cybersecurity and Information Management, Vol. 3 , No. 2 , (2020) : 42-52 (Doi   :  https://doi.org/10.54216/JCIM.030202)