A New Wrapper-Based Feature Selection Technique with Fireworks Algorithm for Android Malware Detection

A New Wrapper-Based Feature Selection Technique with Fireworks Algorithm for Android Malware Detection

Mohamed Guendouz, Abdelmalek Amine
DOI: 10.4018/IJSSCI.312554
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Smartphone use has expanded dramatically in recent years, particularly for Android-based smartphones, due to their wide availability and competitive pricing compared to non-Android devices. The significant increase in the use of Android applications has resulted in a spike in the number of malicious applications, which represent a severe danger to user privacy. In this paper, the authors proposed FWA-FS, a novel method for Android malware detection with feature selection based on the fireworks algorithm. Static analysis is used in the proposed technique to classify applications as benign or malicious. To describe applications, they employ permissions derived from APK files as feature vectors. The most important features were then chosen using the proposed FWA-FS method. Finally, to develop classification models, different machine learning algorithms were trained using specified features. According to experimental findings, the suggested strategy can greatly enhance classification performance with an average increase of 6% and 25% in accuracy for KNN and Naïve Bayes respectively.
Article Preview
Top

1. Introduction

Android, the Linux-based open-source mobile operating system is the largest used mobile OS in the world, it dominates the smartphone OS market with 73% share which makes it the most popular OS in the world, with over 2.5 billion active users. That success is due to the open-source nature of Android itself and for the large availability of smartphones that run it on the one hand, and on the other hand, the large number of apps and games freely available and easily accessible for users. Figure 1 shows the number of available applications in Google Play Store from December 2009 to March 2022.

Android applications are mainly available for download on the Google Play Store which is the official Google app store, and other manufacturer-specific app stores such as: Samsung, Huawei, Xiaomi. Android applications are also available on many unofficial and unsecure third-party websites in a form of APK files. Applications downloaded from these third-party websites could be very dangerous and might contain malware codes since they are not verified by Google or any other device manufacturer, thus, it is necessary to detect malware applications in order to protect user personal data and device integrity.

The primary goal of mobile device malware is to gain access to user data stored locally on the device or on cloud as well as user information used in sensitive financial transactions in mobile banking apps. Mobile malware can be distributed in a variety of ways, including infected file attachments, shared files via Bluetooth and SMS phishing attacks. However, the primary malware distribution channel on mobile devices is currently app stores. According to a recent G DATA's Mobile Security Report (G DATA, 2022), the company's security experts counted more than 2.5 million malware apps for Android devices in 2021. As a result of these factors, Android malware is becoming increasingly problematic for both enterprise and individual users.

Figure 1.

Number of available applications in the Google Play Store from December 2009 to March 2022

IJSSCI.312554.f01

In order to deal with those dangerous attacks, researchers have proposed various methods and techniques to effectively detect malware apps on Android. Many of these methods use machine learning algorithms to classify Android apps into benign or harmful using popular classification algorithms. One of the most used techniques in literature is to use Android permissions as features to train and build one or multiple classification models, this type of techniques are known as permission-based methods.

In permission-based malware detection methods, generally the complete set of features is used as input for training classification algorithms without prior feature selection, because of the large number of Android permissions, which can exceed 150 permissions (XU et al., 2013), using the whole set of features makes training more difficult and can decrease detection accuracy. Feature selection is an essential stage in all machine learning-based techniques. Obtaining an appropriate feature set will not only help in enhancing classification accuracy, but will also help in decreasing the curse of dimensionality associated with most machine learning-based techniques.

In this paper, a novel permission-based machine learning method for Android malware detection with feature selection using Fireworks algorithm is presented. The main contributions of this paper are summarized as follows:

  • 5,000 malicious applications from different malware families and 5,000 benign Android applications from multiple categories were used to generate the dataset.

  • Android permissions were extracted from each application in the dataset and used to generate the feature vector.

  • A new wrapper-based feature selection method based on Fireworks Algorithm was proposed to select the most relevant permissions for Android malware detection using five machine learning algorithms.

  • The performance of our proposed system is demonstrated through experiments using various evaluation metrics.

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024)
Volume 15: 1 Issue (2023)
Volume 14: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 13: 4 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing