Next Article in Journal
Decision Support Models for Operations and Maintenance for Offshore Wind Farms: A Review
Previous Article in Journal
Determining Countermeasures against Fault Currents Using a Decomposition Method Based on Fuzzy Fault Level Constrained Optimal Power Flow
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Research on Data Mining of Permission-Induced Risk for Android IoT Devices

1
School of Computer Science & Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China
2
School of Electronic Science and & Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2019, 9(2), 277; https://doi.org/10.3390/app9020277
Submission received: 25 December 2018 / Revised: 9 January 2019 / Accepted: 9 January 2019 / Published: 14 January 2019

Abstract

:
With the growing era of the Internet of Things (IoT), more and more devices are connecting with the Internet using android applications to provide various services. The IoT devices are used for sensing, controlling and monitoring of different processes. Most of IoT devices use Android applications for communication and data exchange. Therefore, a secure Android permission privileged mechanism is required to increase the security of apps. According to a recent study, a malicious Android application is developed almost every 10 s. To resist this serious malware campaign, we need effective malware detection approaches to identify malware applications effectively and efficiently. Most of the studies focused on detecting malware based on static and dynamic analysis of the applications. However, to analyse the risky permission at runtime is a challenging task. In this study, first, we proposed a novel approach to distinguish between malware and benign applications based on permission ranking, similarity-based permission feature selection, and association rule for permission mining. Secondly, the proposed methodology also includes the enhancement of the random forest algorithm to improve the accuracy for malware detection. The experimental outcomes demonstrate high proficiency of the accuracy for malware detection, which is pivotal for android apps aiming for secure data exchange between IoT devices.

1. Introduction

Nowadays, smart devices have become part of the Internet of Things (IoT), and are widely used in almost every domain such as banking, shopping, social networking, etc. The adoption of the Android platform for smart devices provides a variety of services all over the world. Smart devices that use the architecture of IoT include smart TVs, refrigerators, automobiles, wrist watches, etc. Figure 1 shows some applications areas which use android apps for connecting IoT devices. In the framework of IoT, smartphones are providing numerous advantageous IoT services to clients such as cell phone’s housed sensing (accelerometer, Gyroscope, compass, GPS) and connectivity alternatives (i.e., NFC, RFID, WiFi, Bluetooth). Moreover, smartphones are also used to control and monitor personal and business premises such as controlling the air temperature using Android apps or using CCTV cameras to track work progress. Consequently, in our inexorably associated society, the number and scope of Android devices keep on increasing. It is assessed that there will be roughly 6.1 billion smartphone clients by 2020 [1,2].
On the other side, Android devices are an increasingly attractive target for online criminals who try to hold personal details (i.e., location, contact numbers, accounts, photos, etc.) [3]. This unethical act is targeted by malicious hackers who are trying to use Android application as a tool to break into devices. In addition to this, most of the Android devices do not use anti-virus or malware detection applications [4,5,6]. Additionally, to control a violation of privacy and the leakage of data such as the location of the user, contact information and smartphone certificates, hackers pose a severe threat. The previous literature reports several techniques to address the problem of malware attacks, such as a sandbox, access control, signature mechanism, authority mechanism [7,8,9]. Furthermore, in [3], a M0Droi framework based on API calls has been proposed that generate signatures which are pushed to the client devices for danger identification. However, TaintDroid [10] developed an exception-based malware discovery system based on usage of application data behaviour. Moreover, Canfora G. et al. [11], designed a structure to monitor Android Dalvik activity codes regarding frequencies, which can detect malware applications. Besides, Burguera et al. [12], proposed Crowdroid framework for the client and server components. The client uses the strace mechanism of the Linux system for monitoring android system calls. Kim et al. [13], proposed CopperDroid framework, which detects the behaviour of Java code and local code execution. Although, these reported methods are very effective, yet, these methods can not be directly applied to mobile and IoT devices, because of their limited resources such as memory and power consumption. Several techniques are developed for selecting the permission [14,15,16,17] for instance information gain technique [14], permission but they considered only high-risk permission and ignored the low-risk permissions.
Permission control is a key problem in the security of the Android operating system. Android permissions enforce the restrictions on the specific operation to offer concrete security features. However, it places a significant responsibility on app developers to declare the least privileged set of permissions required by designed apps, and it is up to the app users to completely understand the risk of granting certain permissions. The Android platform provides plenty of documentation with limited information regarding permission. The lack of reliable permission information may allow app developers to request unnecessary permissions, which may lead to overprivileged applications. Additionally, unnecessary perilous permissions may lead to malware apps, which can generate permission oriented attacks. Moreover, the lack of information about the risk level of permissions confuses the users, whether to install the app or not. Currently, the Android permission privileges are not able to help the users to make correct decisions about risk of app or security [14,17,18,19,20,21].
In this paper, we propose a methodology with improved accuracy for malware detection by extracting features based on Android application permissions. The behavioural analysis of permissions helps to detect malware and benign apps. Specifically, we adopted three data mining techniques in our proposed methodology (1) Permission Ranking; (2) similarity-based Permission feature selection; and (3) association rule for permission mining. The Permission Ranking analysis is used to rank the permissions based on their risk. The similarity-based Permission is used to collect the subsets of permissions (individual permissions and group of permissions), which cause a security breach in malware apps. Moreover, the association rule for permission mining discovers meaningful relationships between the permissions. Additionally, the Random Forest classifier is mostly used the algorithm in the detection of malware. Therefore, we improve the accuracy of the random forest algorithm for permission induced malware detection. The improved random forest iteratively removes the unnecessary features. By restricting the upper limit of random forest regarding the number of generated trees based on essential and unnecessary features. So, the improved random forest algorithm contains a reduced but most essential set of features. Furthermore, the experimental results validate the proposed approach for malware detection approach, which can effectively detect malware with more accuracy as compared with the previously reported techniques. Our contribution includes three major folds:
  • We develop a permission-based feature selection approach using (1) Permission Ranking, (2) similarity-based permission feature selection, for the identification of an essential subset of permissions.
  • We also evaluate the effectiveness of the mined association rules for the permission-based which improves the accuracy of prediction.
  • Finally, we enhance the performance of random forest algorithm by iteratively remove the unnecessary features and setting the upper limit on the number of trees in the random forest to improve the accuracy and recall rate, which leads to a secure data exchange between IoT devices and Android devices.
After the brief introduction of the paper, the following sections are arranged as follows. Section 2 contains the previous reported research work on Android malware detection with two major solutions. Section 3 gives a brief overview to the proposed methodology based on extracted features from application permissions. Conducted experiments and results are discussed in Section 4. The last section concludes the contribution of paper and results.

2. Literature Review

In this section, we briefly review the related literature work. Firstly, we discuss the static analysis, which consists of two methods (i) Permission-based analysis (ii) API Call based analysis. Secondly, we elaborate the dynamic analysis that is used to extract the training characteristics of the model. Also, we consider the hybrid analysis that combines the static and dynamic analysis. Finally, we compare the static, dynamic and hybrid analysis.

2.1. Static Analysis

The recent use of static features of machine learning to detect Android malware include the following: Cen et al. [22] proposed a model based on API call and permissions.this method also utilize regularised logistic regression (RLR). Moreover, RLR was compared to different machine learning techniques such as SVM, KNN, decision tree and naive Bayes. DroidMat [23] classified the malware and benign according to the intents, permissions and API calls. For extracting static features, the author used k-nearest neighbors (k-NN) and k-means clustering algorithm. In [24], SVM classifier was developed for on-device malware detection—the proposed algorithm based on API calls, permissions and network access. Yerima et al. [9,25] used random forest ensemble learning models to detect the malware, which was based on permissions, API calls, embedded commands and intents. Wang et al. [26] applied SVM, decision trees and random forest to analyse the use of vulnerable permissions for malware detection. Varsha et al. [27] extricate static features from the manifest and application executable documents; their location strategy gave SVM, rotation forest and random forest on three datasets. DAPASA [28] used sensitive sub-graphs to construct five features depicting invocation patterns, random forest machine learning algorithm achieved the best detection performance.
Wang et al. [26], used logistic regression, linear support vector machines, random forest and decision trees. Furthermore, the author achieved the TPR (true positive rate) of 96% and FPR (false positive rate) of 0.06% with the logistic regression, which was highest as compared with other used classifiers. The dataset used in [26], was composed of 18,363 malware applications and 217,619 benign applications, to describe the particular static signature and stage particular static features. Most of the literature explores machine learning approaches for malware detection [26,29,30,31,32,33,34,35]. The feature extraction methods are shown in Figure 2. Also, Table 1 describes some malware detection methods.
Furthermore, Table 1 and Table 2 shows the feature sets and some static features detection methods, respectively. The k-nearest neighbours machine learning classifier achieves better performance and accuracy in the detection of the malware. However, it takes more processing time with a large amount of data. That is why most of the authors used Support Vector Machine and Random Forest classifiers.Therefore, we use and enhance the Random Forest algorithm for Android malware detection.

2.1.1. Permission-Based Analysis

Since the Android security model is based on application permissions, the permission set was extracted from the manifest file. Every application must have the privileges needed to access different features. During the application installation, the Android platform asks the user whether to grant the requested permissions. There are some permissions, which can be exploited by malicious applications. For example, a malicious application may use the permissions to access the SD card and the Internet, in order to access and filter sensitive information on an SD card. Our approach is to model the group of Android permissions requested by malicious applications. Therefore, we propose a method that uses the appearance of a specific privilege as a feature of a machine learning algorithm.
Among the 145 permission set, 48 permission are risky permissions which are mentioned in Table 3. There are several techniques for selecting the permissions [14,16,17] for instance information gain technique [14], and rank permission technique. Finally, We choose the 48 risky permission set from the previous literature [17]. In this paper, we designed the association mining rule and ranked permission methods for the detection of the malwares.

2.1.2. Suspicious API Calls

The second solution is a static analysis of the source code of the app. Malicious codes usually use a combination of services, methods and API calls that are not common for non-malicious applications [12]. To differentiate malicious and non- malicious applications, the Machine learning algorithms are able to learn common malware services such as combinations of APIs and system calls. Figure 3 shows the some of suspicious API calls, which are mostly used by malware applications. Figure 4 shows the extracted the features from the APK file that contains the classes.dex file.

2.2. Dynamic Analysis

AntiMalDroid [43] was a machine learning method to extract dynamic features, which uses the detection technique based on behavioural sequences as feature vectors with SVM. Also, DroidDolphin [44] use Support Vector Machine with features that obtained dynamically. Afonso et al. [45] proposed a dynamic API calls and framework calls to track and study bolster vector machines, J48, IBk (an example based approach), BayesNet Pool, BayesNet K2, Random Forest, and Naive Bayes.
Figure 5 shows the feature extraction method and detection technique of the dynamic analysis. Many machine learning algorithms used for dynamic analysis for instance, Logistic regression (LR), K-means Clustering, SVM, KNN_E, KNN, Bayesian network (BN), and Nave Bayes. Table 4 illustrates the accuracy level, dynamic features and detection methods.

2.3. Hybrid Analysis

To improve the performance of learning algorithms, the hybrid analysis was developed, which uses the dynamic and static features as shown in Figure 6. Some researches proposed multi-classification techniques [49,50] to obtain high accuracy in the hybrid analysis. Furthermore, the static features are Publisher ID, API call, Class structure, Java Package name, Crypto operations, Intent receivers Services, Receivers, and Permission, and dynamic are Crypto operations, File operations, Network activity. The APK file extracted static features from classes.dex files, and dynamic features from Androidmanifest.xml file. Hybrid Analysis combines static features and dynamic features. These features are used to detect malicious applications. In [51], following features are selected form static ( permission and APICall) and dynamic (SystemCall). Y. Liu, et al. [51] used the SVM and Navie Bayes machine learning classifier. The SVM classifier used for static analysis achieved 93.33 to 99.28 percent accuracy, while the Naive Bayes used for dynamic analysis achieved accuracy up to 90 percent. Furthermore, Kim et al. [13], used the J48 machine learning classier, the features are selected from static (permission ) and dynamic (APICal l). A. Saracino el al. [52], achieved 96.9% accuracy based on KNN by selecting the static feature (permission) and dynamic (critical API, SMS, User activity System call) features.

2.4. A Comparison of Static, Dynamic, and Hybrid Analysis

Static Analysis:
  • Single Category features: The advantages of single category features are easy to extract, and low power computation. The limitations associated with this method are code obstruction, imitation attack and low precision.
  • Multiple categories of Features: The advantages of multiple category features are easy to extract, and high accuracy. The limitations associated with this method are Mimicry attack, high computation, code obfuscation, and difficult to handle multiple features
Dynamic Analysis:
  • Single Category features: it poses a better accuracy and it is easy to recover code obfuscation as compared with static analysis. However, its feature extraction process is difficult, and it consumes high resources.
  • Multiple categories of Features: It gives better accuracy and it is easy to recover code obfuscation as compared with a static and dynamic single category. The limitations of this approach are: (1) difficult to handle multiple features; (2) high resources; and (3) more time needed for computation.
Hybrid Analysis: The main benefits of hybrid analysis are to perform the highest accuracy as compared to static and dynamic analysis. The limitations are (1) highest complexity; (2) framework requirement to combine the static and dynamic features; (3) more resource use; and (4) time-consumption.

3. Proposed Scheme and Methodology

In this section, we propose the malware detection methods. We adopted (i) the permission ranking-based feature selection approach (ii) the similarity based permission feature selection (iii) the association rule mining algorithm and (iv) the modified random forest classifier parameters.
The permission ranking-based feature selection approach and similarity-based permission feature selection rank the features based on frequency. The association rule mining algorithm deletes the permissions, which is common in malware and benign software. Moreover, we improve the accuracy of the random forest algorithm for permission-induced malware detection. The improved random forest iteratively removes the unnecessary features. By comparing the essential and unnecessary features, we formulate an improved random forest algorithm that contains less but most imperative features.

3.1. Permission Ranking

Each permission defines a specific action that the application is permitted to perform. For example, the permission INTERNET specifies the user can access the Internet. Different kinds of benign and malicious applications can request various permissions that correspond to their operational requests. For developing real-time Android malware detection system do not analyze all permission for the malicious application, it needs some common features of the permissions [17].
However, we pay more attention to creating permissions on high—risk external attacks and are often requested by malware samples. Therefore, malware examples rarely require permission to the good indicator of the distinction among malicious and benign applications. Thus, our methodology classifies the highly distinguishable permissions so that we can use the information for classify the malicious apps and benign apps. In addition, we exclude common permission which is used in benign and malicious application because they create ambiguity to detect the malware. For example, both malware and benign applications often request INTERNET permissions because almost all applications require access to the Internet. So our method identifies INTERNET permission.
We demonstrate the schemes which analyze the permission ranking that can be utilized to distinguish malware from benign and malicious application. Ranking is definitely not a new concept. Wang et al. [17], used the ranking-based method, but it only identifies the high-risk permissions. Previous work ignored low-risk permissions because they were interested in identifying malware abuse, and our goal is to develop ranking-based framework that can detect malicious and benign apps. In addition, in the Android platform each permission has a different operation. For instance, permission READ_SD_CARD indicates that apps has access to the mobile disk. We are focusing on the permission to create high risk of the attack by the malware apps. we are focusing to classify the malicious and benign apps for the detection of malware.
The method is based on two matrices: M specify the malware application permission list and B i j indicate the list of permissions for the benign application.
Before calculating the permission from matrices B and M, We check the size of benign and malicious applications. For instance, the quantity of benign application is much larger then malicious application due to this reason dataset is imbalanced. An imbalanced dataset can cause you a lot of frustration. If the size of benign B app is larger than malware M apps for the balance of the two matrices mentioned in the following equation
S B ( P j ) = i B i j size ( B j ) size ( M j )
where P j represented the j t h permission and S B ( P j ) denotes the j t h permission in matrix
R ( P j ) = i M i j S B ( P j ) i M i j + S B ( P j )
In the equation above R ( P j ) denotes the rate of the j t h permission. The value if R ( P j ) between [−1, 1]. If the value of R ( P j ) = 1 , that means ( P j ) is malicious if R ( P j ) = 1 that means benign permission. As we know malicious permission High-Risk permissions and benign low-risk permission. R ( P j ) = 0, impact on ( P j ) is is much less effective in malware detection. We generate two kinds of lists, one in ascending order and other in descending order. Next we recognize the frequency of top permission list used in benign and malicious applications.

3.2. Similarity-Based Permission Feature Selection

In this section, we matched the permission list P . P s b = p 1 , p 2 , p 3 , , p n corresponding to the marking function γ the similarity of permission shown in the equation
S B P j = e p i = 1 n γ S B P j s b ψ P j s b , P j P s b
Thus, we can calculate the similarity between features
S s c o r e = S p + S j
We calculate the maximum similarity of the permission lists and observed the threshold. If threshold is exceed than we consider as a malware otherwise benign. In our experiment threshold and support different value is 0.05 and 0.15 respectively.

3.3. Association Rule Mining Algorithm Based on Probabilistic Model

Association rule mining is used to discover meaningful relationships between variables in huge databases. For example, if events A and B always occur at the same time, then the two events are likely to be associated. for instance, we found that many permission are always together i.e., READ_CONTACTS and WRITE CONTACTS are always used together. These dangerous Android permissions belong to Google’s permission list. As we know, those permissions are always together. So we only need one of them to characterize certain behavior. We need to remove the higher association permission i.e., READ_CONTACTS. In this paper, we define association rules as those with low support but high confidence and proposed association rule mining algorithm for finding the permissions that occur together.
STEP1:
Find out the frequent two-permissions sets
STEP2:
Diversity-based interestingness measures for association rule using frequent two itemsets that was developed by Piatetsky-Shapiro [53]
-
When support ( Y Z ) s u p p o r t ( Y ) s u p p o r t ( Z ) , the two-item sets ( Y , Z ) are mutually independent. That is, the association rule Y Z is uninteresting.
i n t e r e s t ( y , z ) = s u p p o r t ( Y Z ) s u p p o r t ( Y Z ) 1 = P ( Y | Z ) P ( Z )
-
if interest ( Y , Z ) > 0 , Y and Z are correlated positively.
-
if interest ( Y , Z ) 0 , Y and Z are commonly independent, and the common two-item sets should be rejected.
-
if interest ( Y , Z ) < 0 , Y and Z are negatively correlated.
STEP3:
Create the association rule based on the permission shown in Algorthim 1
STEP4:
Calculate probability table of the association rules.
Algorithm 1 Association Rule set R For Permission Based
  1: i n p u t 1 Associaion Rule Set R
  2: m i n S u b minimum thershold of support cofficient
  3: m i n C o n f minimum thershold of confidence cofficient
  4: for Z=D do
  5:        r = n u l l
  6:        r . P u s h T a i l ( Z )
  7:       for Y in D do
  8:           if Y Z L2 and s u p p o r t ( Y Z ) > m i n s u p and c o n f i d e n c e ( Y Z ) > m i n c o f then
  9:                 r . P u s h T a i l ( Y )
10:         end if 
11:          r . P u s h T a i l ( r )
12:     end for 
13: end for 
14: o u t p u t Association Rule R

3.4. Improved Random Forest Classifier

The voting decision process is an important part of the RF algorithm and it determines the final classification of the test sample. The RF algorithm adopts the principle of simple voting. Each decision tree is given the same weight, ignoring the difference between the strong classifier and the weak classifier, and affecting the overall classification performance of the random forest classifier. For this reason, this paper adopts the weighted voting principle to modify the RF algorithm to form an improved IRF (improved random forest) Algorithm 2. The Table 5 shows the list of symbols used in Algrothim 2. The architecture of training and testing shown in Figure 7 and description of the algorithm is shown in Figure 8. we have changed the few parameters of the random forest algorithm as we can see in line no. 11 and 12, we tuned the parameters. The line no. 11, iteratively removes the unnecessary features. By comparing the essential and unnecessary features, we formulate an improved random forest algorithm that contains less but most important features. Consequently, we enhance the accuracy of the random forest algorithm by removing the extra features and further improves the more performance in feature selection.
Algorithm 2 Modified Random Forest (IRF)
  1: Grow inital forest ( θ 0 ) and B 0 random tress and feature vector F 0 ( . )
  2: An average ranking calculated weight w ( . ) ranked the all features F 0 ( . )
  3: Features from the ranked list, place the top u 0 = F 0 ( . ) in T 0
  4: Put rest V 0 = # F 0 ( . ) u 0 features in t 1
  5: n is the number of pass. Initialize n = 0
  6: for u n > f do
  7:  compute mean u n and standard deviation σ n of features weights in t 1
  8:  Find R n = j ε t 1 : w ( j ) > ( u n 2 σ n ) , if no such j exist R n = { j } , j ε t 1 : w ( j ) = minW ( k )
  9:   get rid of unimportant features, find the most informative feature set A n whose weight greater than the minimum value of the important features weight. so A n = { j } : w ( j ) = min j ε t 1 n + 1 , k ε t n + 1
10:  Find F n + 1 k ( . ) = F n ( . ) R n
11:  Find T n + 1 = T n + A n and T n + 1 1 = T n 1 = R n A n
12:   u n + 1 = # T n + 1 and u n + 1 = # T n + 1 1 . Calculate Δ u n = u n + 1 u n and Δ v n = v n + 1 v n
13:  Find v Δ B < l q u Δ u + l q v Δ v ; B n + 1 = B n + Δ B
14:  Grow forest ( θ 0 ) and B 0 tress and feature vector F n + 1 ( . )
15:  Calculate Weights w ( . ) and ranked the all features F n + 1 ( . )
16:   n = n + 1
17: end for

4. Experimentation and Results

To calculate the effectiveness of the machine learning classifier such as Random Forest, J48 and Naive Bayes. we select the formulas to evaluate the classifiers and effectiveness of the dataset.
TN True negative rate—the rate of malware detection recognized correctly as malicious.
TP True positive rate—the rate of benign apps detection recognized incorrectly as benign.
FP False positive rate—the rate of malware recognized incorrectly as malicious.
FN False negative rate—the rate of benign apps recognized incorrectly as benign.
Given the number of true positives and false negatives, recall is calculated using the following formula
T P R = T N T N + F P
The TPR is sometimes referred to as “sensitivity”or the “true positive rate”. Given the number of true positive and false positive classified items, precision (also known as “positive predictive rate”) is calculated as follows:
F P R = F N F N + T P

4.1. DATASET

To excavate practical significance, it can cover most Android permission models, which have their own characteristics. In this paper, our dataset composed of malware and benign application. The dataset includes 6192 benign and 5560 malware apps, collected from the Google Play Store and the Chinese App store. Figure 9 shows the frequency of the permission. Therefore, we collect dataset from multiple sources for considering the more attributes.

4.2. Ranking and Similarity Based Frequency of the Permissions

We generate the top 10 permission combination based on probability and negative rate. The frequency of benign and malware application with k = 1, 2, 3, 4 are shown in Figure 10, Figure 11, Figure 12 and Figure 13, respectively. When k = 1, READ_SMS, SEND_SMS, WRITE_SMS and RECIEVE_SMS much more commonly than the benign applications. To detect these two types of important permissions k = 2, then two permission more frequently appear in malware (READ PHONE STATE & READ SMS, INTERNET & READ SMS). Through the combination of INTERNET and READ SMS permissions, malware can send private messages over the Internet; through a combination of READ PHONE STATE and READ SMS permissions, malware can read phone IDs such as IMSI (International Mobile Subscriber Identification) and IMEI (International Mobile Equipment Identity), as well as SMS messages, which can be used to detect mobile users and collect personal information. For larger k, the combination of permissions obtained is more intrusive. We found that the larger the value of k, the higher the precision of the permission combination to identify malware. We studied the results of k = 1, 2, 3, 4, and found that some permission are similar malicious and benign applications. While some combinations of permissions are clearly malware are requested more frequently than benign applications. Almost all combinations of permissions frequently requested by malware include SMS-related permissions, such as READ_SMS and WRITE_SMS. We suspect this is because most of the examples in malware datasets are related to SMS attacks, such as intercepting and leaking SMS messages, and sending SMS messages to advanced numbers. The top 10 petterns according to common and run time permission pattern shows in Table 6.

4.3. Association Rule Mining Algorithm Based Feature Selection

We generate the top permission based on data mining association rule Algorithm. The permission WRITE_SMS frequently appear in benign and malware, while READ_SMS is mainly used by malware. When we delete the privilege WRITE_SMS, the application requesting permission READ_SMS is likely to be classified as malware. Furthermore, we found that WAKE_LOCK, and READ_HISTORY_BOOKMARKS and WRITE_HISTORY_BOOKMARKS, and READ_PHONE_STATE have a high occurrence of being associated. After trimming the three permission characteristics in the dataset, we only reserved some features. Then we observed that a new model using the permissions set in Table 7.
We arrange that different permission ordering methods result in different sorted lists. For instance, we give up INTERNET permissions because it indicates that both benign and malicious applications usually require INTERNET. However, the mutual information-based ranking method saves the permission INTERNET, because all applications often request the permission INTERNET. Therefore, we believe that our algorithms can preserve more important permissions by deleting unimportant or irrelevant permissions. Our approach distinguish malware applications (with a higher review rate), which is necessary for malware detection.

4.4. Machine Learning Malware Detection

Our experiment uses different kinds of machine learning algorithms (i.e., naive Bayes, Random Forest iterative Random Forests and J48 decision tree). We used machine learning techniques after using the probability-based model and association-based algorithm. We evaluate the performance of the random forest algorithm regarding detection accuracy. Figure 14 shows the machine learning models; the random forest algorithm achieves more than 98% accuracy, we achieve the highest recall rate for detection the dangerous permission of Android platform. Table 8 shows the improved random forest achieved the best performance and provided the highest efficiency and lowest false alarm rate.
In Figure 15, we obtained the average processing time of the random forest, naive Bayes and J48 machine learning classifier based on the recall rates of the permissions. As shown, naive Bayes is the most less time-consuming machine learning algorithm. When using a naive Bayes with 10 significant permissions, the processing time averages only 0.1 s, compared to the improved random forest 0.24 s for the malware detection. In addition, our approach report that recall rate for detection the dangerous permission of Android platform shown in Figure 16.

4.5. Compared with Other Methods

There are several techniques developed for selecting the permission [14,16,17] for instance information gain technique [14], and rank permission technique. Based on these permission set, we designed the association mining rule and ranked permission methods for detecting the malware.
We analyse our results by comparing them with the other methods proposed by Wang et al. [17], which uses the ranking-based approach, but it only identifies the high-risk permissions and ignores the low-risk permissions. We focused on the low-risk as well as high-risk permissions. We additionally observe that, despite only a small amount of permissions, our methodology is as yet better than most existing malware scanners currently available. Some detection techniques rely only on signature, it looks for specific patterns, so if a particular type of malware signature pattern is not matched, then the system will not be able to detect the particular type of malware.
The DREBIN [24] method was used for static analysis to build datasets based on application permissions and other features. Our approach is more efficient than DREBIN when combining permission. Also, the support vector machine (SVM) algorithm was used to classify malware datasets. It is a little challenging to enhance DREBIN and SVM. Previous research [14,20,36,38] shows the Random Forest achieved the best performance in detection of malware application.
Therefore, we modify the Random Forest algorithm to achieve better accuracy as compared with a simple Random Forest algorithm. The result shows that the proposed malware detection approach can effectively detect malware with more accuracy (98.1%). Moreover, the true positive rate and false positive rate of improved random forest are, 95.5% and 4.6%, respectively. The experimental results show improved random forest algorithm is effective for the detection of malware. Besides the significance of proposed approach towards malware detection, the limitations associated with this approach include accuracy comparison with other studies and handling towards the feature hiding techniques when decompile the apk using Dex2jar. Furthermore, in future, we plan to develop a framework based on the blockchain to combine static and dynamic analysis for run-time malware detection.

5. Conclusions

Recently, there is an increase in the number of IoT devices connected to the Internet. Most of these IoT devices use Android applications for communication and data exchange. The permission mechanism of the Android platform restricted the access of the applications. Permission can be used as elements of Android applications to detect benign apps and malware apps. However, our work reduced the number of permission for maintaining accuracy and high effectiveness. In this work, Firstly, we adopted three data mining techniques (1) Permission Ranking; (2) similarity-based Permission feature selection; and (3) association rule for permission mining. The permission ranking analysis and similarity-based permission are used to rank the permissions based on their risk and to collect the subsets of permissions (individual permissions and group of permissions), respectively. Moreover, the association rule for permission mining discovers meaningful relationships between the permissions. Secondly, we improve the accuracy of the random forest algorithm for permission induced malware detection. The accuracy of random forest was improved by modifying selective parameters of the algorithm, (1) iteratively removing the unnecessary features, (2) by setting the upper limit on the number of trees in the random forest. The result shows that the proposed malware detection approach can effectively detect malware with more accuracy (98.1%) with true positive rate and false positive rate, 95.5% and 4.6%. Furthermore, the development of a framework based on the blockchain to combine static and dynamic analysis approaches for run-time malware detection would be a good topic for future work.

Author Contributions

Formal analysis, R.K.; Methodology, R.K.; Project administration, X.Z.; Validation, R.U.K.; Writing—original draft, R.K.; Writing—review and editing, A.S.

Acknowledgments

This research was supported by the National Natural Science Foundation of China under grant No. 61572115.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Park, J.S.; Youn, T.Y.; Kim, H.B.; Rhee, K.H.; Shin, S.U. Smart contract-based review system for an IoT data marketplace. Sensors 2018, 18, 3577. [Google Scholar] [CrossRef] [PubMed]
  2. Risteska Stojkoska, B.L.; Trivodaliev, K.V. A review of Internet of Things for smart home: Challenges and solutions. J. Clean. Prod. 2017, 140, 1454–1464. [Google Scholar] [CrossRef]
  3. Damshenas, M.; Dehghantanha, A.; Choo, K.K.R.; Mahmud, R. M0Droid: An Android Behavioral-Based Malware Detection Model. J. Inf. Priv. Secur. 2015, 11, 141–157. [Google Scholar] [CrossRef]
  4. Walls, J.; Choo, K.K.R. A review of free cloud-based anti-malware apps for android. In Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Helsinki, Finland, 20–22 August 2015; Volume 1, pp. 1053–1058. [Google Scholar] [CrossRef]
  5. Chen, H.; Su, J.; Qiao, L.; Xin, Q.; Chen, H.; Su, J.; Qiao, L.; Xin, Q. Malware Collusion Attack against SVM: Issues and Countermeasures. Appl. Sci. 2018, 8, 1718. [Google Scholar] [CrossRef]
  6. Dogru, B.; Kiraz, O. Web-Based Android Malicious Software Detection and Classification System. Appl. Sci. 2018, 8, 1622. [Google Scholar] [CrossRef]
  7. Sui, L. Strategy Analytics: Android captures record 88 percent share of global smartphone shipments in Q3 2016. Strateg. Anal. Res. Experts Anal. 2016, 28, 28–35. [Google Scholar]
  8. Demontis, A.; Melis, M.; Biggio, B.; Maiorca, D.; Arp, D.; Rieck, K.; Corona, I.; Giacinto, G.; Roli, F. Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection. IEEE Trans. Dependable Secur. Comput. 2017, 5971. [Google Scholar] [CrossRef]
  9. Yerima, S.Y.; Sezer, S.; Muttik, I. Android malware detection using parallel machine learning classifiers. In Proceedings of the 2014 8th International Conference on Next Generation Mobile Applications, Services and Technologies, NGMAST 2014, Oxford, UK, 10–12 September 2014. [Google Scholar] [CrossRef]
  10. Enck, W.; Gilbert, P.; Chun, B.G.; Cox, L.P.; Jung, J.; McDaniel, P.; Sheth, A.N. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. Commun. ACM 2014, 57, 99–106. [Google Scholar] [CrossRef]
  11. Canfora, G.; Mercaldo, F.; Visaggio, C. Mobile malware detection using op-code frequency histograms. In Proceedings of the SECRYPT 2015—12th International Conference on Security and Cryptography, Part of 12th International Joint Conference on e-Business and Telecommunications (ICETE 2015), Colmar, France, 20–22 July 2015. [Google Scholar] [CrossRef]
  12. Burguera, I.; Zurutuza, U.; Nadjm-Tehrani, S. Crowdroid: Behavior-Based Malware Detection System for Android. In Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices—SPSM ’11, Chicago, IL, USA, 17–21 October 2011; p. 15. [Google Scholar] [CrossRef]
  13. Kim, J.; Choi, H.; Namkung, H.; Choi, W.; Choi, B.; Hong, H.; Kim, Y.; Lee, J.; Han, D. Enabling Automatic Protocol Behavior Analysis for Android Applications. In Proceedings of the CoNEXT 2016—Proceedings of the 12th International Conference on Emerging Networking EXperiments and Technologies, Irvine, CA, USA, 12–15 December 2016; pp. 281–295. [Google Scholar] [CrossRef]
  14. Chan, P.P.; Song, W.K. Static detection of Android malware by using permissions and API calls. In Proceedings of the International Conference on Machine Learning and Cybernetics, Lanzhou, China, 13–16 July 2014; Volume 1, pp. 82–87. [Google Scholar] [CrossRef]
  15. Dini, G.; Martinelli, F.; Matteucci, I.; Petrocchi, M.; Saracino, A.; Sgandurra, D. Risk analysis of Android applications: A user-centric solution. Future Gener. Comput. Syst. 2018. [Google Scholar] [CrossRef]
  16. Seo, S.H.; Gupta, A.; Sallam, A.M.; Bertino, E.; Yim, K. Detecting mobile malware threats to homeland security through static analysis. J. Netw. Comput. Appl. 2014, 38, 43–53. [Google Scholar] [CrossRef]
  17. Wang, W.; Wang, X.; Feng, D.; Liu, J.; Han, Z.; Zhang, X. Exploring permission-induced risk in android applications for malicious application detection. IEEE Trans. Inf. Forensics Secur. 2014, 9, 1869–1882. [Google Scholar] [CrossRef]
  18. Felt, A.; Chin, E.; Hanna, S. Android permissions demystified. In Proceedings of the 18th ACM Conference on Computer and Communications Security—CCS ’11 (2011), Chicago, IL, USA, 17—21 October 2011; pp. 627–636. [Google Scholar] [CrossRef]
  19. Huang, C.Y.; Tsai, Y.T.; Hsu, C.H. Performance Evaluation on Permission-Based Detection for Android Malware. Smart Innov. Syst. Technol. 2013. [Google Scholar] [CrossRef]
  20. Kumar, A.; Kuppusamy, K.S.; Aghila, G. FAMOUS: Forensic Analysis of MObile devices Using Scoring of application permissions. Future Gener. Comput. Syst. 2018. [Google Scholar] [CrossRef]
  21. Li, J.; Sun, L.; Yan, Q.; Li, Z.; Srisa-An, W.; Ye, H. Significant Permission Identification for Machine-Learning-Based Android Malware Detection. IEEE Trans. Ind. Inform. 2018. [Google Scholar] [CrossRef]
  22. Cen, L.; Gates, C.S.; Si, L.; Li, N. A Probabilistic Discriminative Model for Android Malware Detection with Decompiled Source Code. IEEE Trans. Dependable Secur. Comput. 2015, 12, 400–412. [Google Scholar] [CrossRef]
  23. Wu, D.J.; Mao, C.H.; Wei, T.E.; Lee, H.M.; Wu, K.P. DroidMat: Android malware detection through manifest and API calls tracing. In Proceedings of the 2012 7th Asia Joint Conference on Information Security (AsiaJCIS 2012), Tokyo, Japan, 9–10 August 2012. [Google Scholar] [CrossRef]
  24. Arp, D.; Spreitzenbarth, M.; Hübner, M.; Gascon, H.; Rieck, K. Drebin: Effective and Explainable Detection of Android Malware in Your Pocket. In Proceedings of the 2014 Network and Distributed System Security Symposium, San Diego, CA, USA, 23–26 February 2014. [Google Scholar] [CrossRef]
  25. Yerima, S.Y.; Sezer, S.; Muttik, I. High accuracy android malware detection using ensemble learning. IET Inf. Secur. 2015, 9, 313–320. [Google Scholar] [CrossRef] [Green Version]
  26. Wang, X.; Wang, W.; He, Y.; Liu, J.; Han, Z.; Zhang, X. Characterizing Android apps’ behavior for effective detection of malapps at large scale. Future Gener. Comput. Syst. 2017, 75, 30–45. [Google Scholar] [CrossRef]
  27. Varsha, M.V.; Vinod, P.; Dhanya, K.A. Identification of malicious android app using manifest and opcode features. J. Comput. Virol. Hacking Tech. 2017, 13, 125–138. [Google Scholar] [CrossRef]
  28. Fan, M.; Liu, J.; Wang, W.; Li, H.; Tian, Z.; Liu, T. DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis. IEEE Trans. Inf. Forensics Secur. 2017, 12, 1772–1785. [Google Scholar] [CrossRef]
  29. Ban, T.; Takahashi, T.; Guo, S.; Inoue, D.; Nakao, K. Integration of Multi-modal Features for Android Malware Detection Using Linear SVM. In Proceedings of the 11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, 4–5 August 2016; pp. 141–146. [Google Scholar] [CrossRef]
  30. Idrees, F.; Rajarajan, M. Investigating the android intents and permissions for malware detection. In Proceedings of the International Conference on Wireless and Mobile Computing, Networking and Communications, Larnaca, Cyprus, 8–10 October 2014; pp. 354–358. [Google Scholar] [CrossRef]
  31. Kang, B.; Yerima, S.Y.; Sezer, S.; Mclaughlin, K. N-gram Opcode Analysis for Android Malware Detection. Int. J. Cyber Situat. Aware. 2016, 1, 231–254. [Google Scholar] [CrossRef]
  32. Khan, R.U.; Zhang, X.; Kumar, R. Analysis of ResNet and GoogleNet models for malware detection. J. Comput. Virol. Hacking Tech. 2018, 1–9. [Google Scholar] [CrossRef]
  33. Kumar, R.; Xiaosong, Z.; Khan, R.U.; Kumar, J.; Ahad, I. Effective and Explainable Detection of Android Malware Based on Machine Learning Algorithms. In Proceedings of the 2018 International Conference on Computing and Artificial Intelligence, Chengdu, China, 12–14 March 2018; pp. 35–40. [Google Scholar]
  34. Westyarian; Rosmansyah, Y.; Dabarsyah, B. Malware detection on Android smartphones using API class and machine learning. In Proceedings of the 5th International Conference on Electrical Engineering and Informatics: Bridging the Knowledge between Academic, Industry, and Community (ICEEI 2015), Denpasar, Indonesia, 10–11 August 2015; pp. 294–297. [Google Scholar] [CrossRef]
  35. Wu, S.; Wang, P.; Li, X.; Zhang, Y. Effective detection of android malware based on the usage of data flow APIs and machine learning. Inf. Softw. Technol. 2016, 75, 17–25. [Google Scholar] [CrossRef]
  36. Aung, Z.; Zaw, W. Permission-Based Android Malware Detection. Int. J. Sci. Technol. Res. 2013, 2, 228–234. [Google Scholar]
  37. Peng, H.; Gates, C.; Sarma, B.; Li, N.; Qi, Y.; Potharaju, R.; Nita-Rotaru, C.; Molloy, I. Using probabilistic generative models for ranking risks of Android apps. In Proceedings of the 2012 ACM Conference on Computer And Communications Security—CCS ’12, Raleigh, NC, USA, 16–18 October 2012. [Google Scholar] [CrossRef]
  38. Pehlivan, U.; Baltaci, N.; Acarturk, C.; Baykal, N. The analysis of feature selection methods and classification algorithms in permission based Android malware detection. In Proceedings of the IEEE SSCI 2014: 2014 IEEE Symposium Series on Computational Intelligence—CICS 2014: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, Orlando, FL, USA, 9–12 December 2014. [Google Scholar] [CrossRef]
  39. Aafer, Y.; Du, W. Droidapiminer: Mining Api-Level Features for Robust Malware Detection in Android. In Proceedings of the International Conference on Security and Privacy in Communication Systems, Sydney, NSW, Australia, 25–28 September 2013. [Google Scholar]
  40. Itoh, Y.; Orlosky, J.; Huber, M.; Kiyokawa, K.; Klinker, G. OST Rift: Temporally consistent augmented reality with a consumer optical see-through head-mounted display. In Proceedings of the 2016 IEEE Virtual Reality (VR), Greenville, SC, USA, 19–23 March 2016. [Google Scholar] [CrossRef]
  41. Chuang, H.Y.; Wang, S.D. Machine Learning Based Hybrid Behavior Models for Android Malware Analysis. In Proceedings of the 2015 IEEE International Conference on Software Quality, Reliability and Security, QRS 2015, Vancouver, BC, Canada, 3–5 August 2015. [Google Scholar] [CrossRef]
  42. Xu, K.; Li, Y.; Deng, R.H. ICCDetector: ICC-Based Malware Detection on Android. IEEE Trans. Inf. Forensics Secur. 2016, 11, 1252–1264. [Google Scholar] [CrossRef]
  43. Zhao, M.; Ge, F.; Zhang, T.; Yuan, Z. AntiMalDroid: An efficient SVM-based malware detection framework for android. Commun. Comput. Inf. Sci. 2011, 243, 158–166. [Google Scholar] [CrossRef]
  44. Wu, W.C.; Hung, S.H. DroidDolphin: A dynamic android malware detection framework using big data and machine learning. In Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, RACS 2014, Towson, MD, USA, 5–8 October 2014; pp. 247–252. [Google Scholar] [CrossRef]
  45. Afonso, V.M.; de Amorim, M.F.; Grégio, A.R.A.; Junquera, G.B.; de Geus, P.L. Identifying Android malware using dynamically obtained features. J. Comput. Virol. Hacking Tech. 2015, 11, 9–17. [Google Scholar] [CrossRef]
  46. Isohara, T.; Takemori, K.; Kubota, A. Kernel-based behavior analysis for android malware detection. In Proceedings of the 2011 7th International Conference on Computational Intelligence and Security (CIS 2011), Hainan, China, 3–4 December 2011. [Google Scholar] [CrossRef]
  47. Ham, Y.J.; Lee, H.W. Detection of Malicious Android Mobile Applications Based on Aggregated System Call Events. Int. J. Comput. Commun. Eng. 2014, 3, 149. [Google Scholar] [CrossRef]
  48. Ham, Y.J.; Moon, D.; Lee, H.W.; Lim, J.D.; Kim, J.N. Android mobile application system call event pattern analysis for determination of malicious attack. Int. J. Secur. Its Appl. 2014, 8, 231–246. [Google Scholar] [CrossRef]
  49. Huda, S.; Islam, R.; Abawajy, J.; Yearwood, J.; Hassan, M.M.; Fortino, G. A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection. Future Gener. Comput. Syst. 2018, 83, 193–207. [Google Scholar] [CrossRef]
  50. Ferrante, A.; Malek, M.; Martinelli, F.; Mercaldo, F.; Milosevic, J. Extinguishing ransomware—A hybrid approach to android ransomware detection. In Proceedings of the International Symposium on Foundations and Practice of Security, Nancy, France, 23–25 October 2017; Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer: Berlin, Germany, 2018. [Google Scholar] [CrossRef]
  51. Liu, Y.; Zhang, Y.; Li, H.; Chen, X. A hybrid malware detecting scheme for mobile Android applications. In Proceedings of the 2016 IEEE International Conference on Consumer Electronics (ICCE 2016), Las Vegas, NV, USA, 7–11 January 2016; 2016. [Google Scholar] [CrossRef]
  52. Saracino, A.; Sgandurra, D.; Dini, G.; Martinelli, F. MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention. IEEE Trans. Dependable Secur. Comput. 2018, 15, 83–97. [Google Scholar] [CrossRef]
  53. Piatetsky-Shapiro, G. Discovery, analysis and presentation of strong rules. Knowl. Discov. Databases 1991, 229–238. [Google Scholar] [CrossRef]
Figure 1. IoT devices Connected with Android devices and apps.
Figure 1. IoT devices Connected with Android devices and apps.
Applsci 09 00277 g001
Figure 2. Feature Extraction of method.
Figure 2. Feature Extraction of method.
Applsci 09 00277 g002
Figure 3. Suspicious API calls.
Figure 3. Suspicious API calls.
Applsci 09 00277 g003
Figure 4. Workflow of Android file decompiling.
Figure 4. Workflow of Android file decompiling.
Applsci 09 00277 g004
Figure 5. Dynamic Feature Extraction and Detection.
Figure 5. Dynamic Feature Extraction and Detection.
Applsci 09 00277 g005
Figure 6. Dynamic Feature Extraction and Detection.
Figure 6. Dynamic Feature Extraction and Detection.
Applsci 09 00277 g006
Figure 7. Random Forest Algorithm.
Figure 7. Random Forest Algorithm.
Applsci 09 00277 g007
Figure 8. Flow Chart of Random Forest Algorithm.
Figure 8. Flow Chart of Random Forest Algorithm.
Applsci 09 00277 g008
Figure 9. Top 20 Permission Frequency in dataset.
Figure 9. Top 20 Permission Frequency in dataset.
Applsci 09 00277 g009
Figure 10. Top 10 Premission Combination k = 1.
Figure 10. Top 10 Premission Combination k = 1.
Applsci 09 00277 g010
Figure 11. Top 10 Premission Combination k = 2.
Figure 11. Top 10 Premission Combination k = 2.
Applsci 09 00277 g011
Figure 12. Top 10 Premission Combination k = 3.
Figure 12. Top 10 Premission Combination k = 3.
Applsci 09 00277 g012
Figure 13. Top 10 Premission Combination k = 4.
Figure 13. Top 10 Premission Combination k = 4.
Applsci 09 00277 g013
Figure 14. Performance and comparison of machine learning classifiers.
Figure 14. Performance and comparison of machine learning classifiers.
Applsci 09 00277 g014
Figure 15. Modeling time comparison of different classifiers.
Figure 15. Modeling time comparison of different classifiers.
Applsci 09 00277 g015
Figure 16. Comparison between different machine learning classifiers on dynamic features.
Figure 16. Comparison between different machine learning classifiers on dynamic features.
Applsci 09 00277 g016
Table 1. Static features detection methods.
Table 1. Static features detection methods.
RefFeaturesAccuracyMachine Learning Models
[36]Permission91.75%Random Forest
[19]Permission81%C4.5, SVM
[37]Permission88.2%HMNB
[15]Permission-AHP
[21]Permission98.6J48
[20]Permission92.79%Random Forest
[38]Permission94.90%Random Forest
[14]Permission, API calls92.36%Random Forest
[23]Permission, API calls, intent97.87%k-nearest neighbors
[39]API call99%k-nearest neighbors
[40]API call93.04%Signature matching
[41]API call96.69%SVM
[42]ICC related features97.4%SVM
[9]Permission, command, API calls98.6%Parallel classifier
Table 2. Overview of feature sets.
Table 2. Overview of feature sets.
Feature Sets
manifestS1Hardware components
S2Requested permissions
S3Application components
S4Filtered intents
dexcodeS5Restricted API calls
S6Used permission
S7Suspicious API calls
S8Network addresses
Table 3. Permission set mostly used in malware.
Table 3. Permission set mostly used in malware.
Risky Permissions
ACCESS_WIFI_STATESEND_SMS
READ_LOGSREAD_CALL_LOG
CAMERADISABLE_KEYGUARD
CHANGE_NETWORK_STATERESTART_PACKAGES
WRITE_APN_SETTINGSSET_WALLPAPER
CHANGE_WIFI_STATEINSTALL_PACKAGES
READ_CONTACTSWRITE_CONTACTS
WRITE_SETTINGSGET_TASKS
RECEIVE_MMSACCESS_WIFI_STATE
WRITE_APN_SETTINGSSYSTEM_ALERT_WINDOW
READ_HISTORY_BOOKMARKSRECEIVE_BOOT_COMPLETED
ACCESS_NETWORK_STATECALL_PHONE
READ_EXTERNAL_STORAGEACCESS_FINE_LOCATION
EXPAND_STATUS_BARADD_SYSTEM_SERVICE
PERSISTENT_ACTIVITYINTERNET
GET_ACCOUNTSWRITE_SMS
PROCESS_OUTGOING_CALLSCHANGE_CONFIGURATION
READ_HISTORY_BOOKMARKSGET_PACKAGE_SIZE
WAKE_LOGACCESS_MOCK_LOCATION
WRITE_CALL_LOGWRITE_HISTORY_BOOKMARKS
READ_PHONE_STATERECEIVE_WAP_PUSH
SET_ALARAMWRITE_SMS
RECEIVE_SMSREAD_SMS
Table 4. Dynamic features detection methods.
Table 4. Dynamic features detection methods.
RefFeaturesAccuracyMachine Learning Models
[46]System call91.75%Signature Matching
[12]System call81%K-Means
[47]System call88.2%Frequency
[48]System call-Pattern matching
[35]API call97.6KNN_M
[19]Native Size99.9%RF, SVM
Table 5. List of Symbols.
Table 5. List of Symbols.
SymbolDefinition
F 0 ( . ) Initial feature vector
F n ( . ) Feature vector at the n t h construction process
u n Number of important features
v n Number of unimportant features
θ n Forest at the n t h construction process
B n Number of tress
T n Bag of important features
T n 1 Bag of unimportant features
w ( j ) Weight of features j
R n remove features until all the features have been eliminated
A n new feature “mark as important”
nClassification accuracy
Table 6. Permission Patterns Malware and Benign.
Table 6. Permission Patterns Malware and Benign.
Permission PatternsBenignMalware
Common Android request permission
READ_PHONE_STATE, ACCESS_WIFI_STATE2.3663.08
INTERNET, ACCESS_WIFI_STATE5.0563.49
READ_PHONE_STATE31.8793.4
ACCESS_WIFI_STATE5.2263.49
ACCESS_NETWORK_STATE, ACCESS_WIFI_STATE3.9960.31
INTERNET, WRITE_EXTERNAL_STORAGE, READ_PHONE_STATE13.2865.44
INTERNET, READ_PHONE_STATE, ACCESS_NETWORK_STATE24.2178.97
INTERNET, READ_PHONE_STATE31.2193.078
WRITE_EXTERNAL_STORAGE, READ_PHONE_STATE13.3765.53
READ_PHONE_STATE, ACCESS_NETWORK_STATE24.2179.05
Common Android Run-time Permissions
READ_PHONE_STATE, ACCESS_NETWORK_STATE23.6377.18
INTERNET, READ_LOGS6.856.85
READ_PHONE_STATE30.3291.69
INTERNET, READ_PHONE_STATE, ACCESS_NETWORK_STATE26.3677.18
READ_PHONE_STATE, VIBRATE21.9265.28
INTERNET, READ_PHONE_STATE29.991.52
READ_PHONE_STATE, READ_LOGS5.3846.86
READ_LOGS6.9347.6
INTERNET, READ_PHONE_STATE, VIBRATE21.6865.12
Unique Android request permission
READ_PHONE_STATE, WRITE_SMS050.94
INTERNET, READ_PHONE_STATE, ACCESS_WIFI_STATE063.09
ACCESS_NETWORK_STATE, RECEIVE_BOOT_COMPLETED051.68
ACCESS_NETWORK_STATE, WRITE_SMS049.64
RECEIVE_BOOT_COMPLETED, ACCESS_WIFI_STATE042.63
INTERNET, RECEIVE_BOOT_COMPLETED044.75
WRITE_EXTERNAL_STORAGE, ACCESS_NETWORK_STATE, ACCESS_WIFI_STATE054.53
READ_PHONE_STATE, RECEIVE_BOOT_COMPLETED043.12
INTERNET, SEND_SMS043.12
INTERNET, ACCESS_NETWORK_STATE, ACCESS_WIFI_STATE060.31
Unique Android Runtime Permissions
INTERNET, READ_PHONE_STATE, ACCESS_NETWORK_STATE, VIBRATE055.42
ACCESS_NETWORK_STATE, VIBRATE, READ_LOGS038.55
READ_PHONE_STATE, ACCESS_NETWORK_STATE, READ_LOGS043.2
READ_LOGS, INTERNET, ACCESS_NETWORK_STATE043.2
READ_PHONE_STATE, VIBRATE, READ_LOGS041.33
INTERNET, VIBRATE, READ_LOGS041.49
READ_LOGS, INTERNET, READ_PHONE_STATE,046.87
ACCESS_FINE_LOCATION, READ_PHONE_STATE, VIBRATE, INTERNET034.23
INTERNET, SEND_SMS033.58
INTERNET, ACCESS_FINE_LOCATION, READ_LOGS028.45
Table 7. Random Forest Based Malware Detection for Permissions.
Table 7. Random Forest Based Malware Detection for Permissions.
Random Forest Based Malware Detection for Permissions
ACCESS_WIFI_STATESEND_SMS
READ_LOGSREAD_CALL_LOG
RESTART_PACKAGESDISABLE_KEYGUARD
READ_EXTERNAL_STORAGECHANGE_NETWORK_STATE
WRITE_APN_SETTINGSSET_WALLPAPER
CHANGE_WIFI_STATEINSTALL_PACKAGES
READ_CONTACTSWRITE_CONTACTS
CAMERAGET_TASKS
READ_HISTORY_BOOKMARKSACCESS_WIFI_STATE
WRITE_APN_SETTINGSSYSTEM_ALERT_WINDOW
WRITE_SETTINGSRECEIVE_BOOT_COMPLETED
Table 8. Comparison different machine learning classifiers.
Table 8. Comparison different machine learning classifiers.
AlogrthimTPFPTNFNTPRFPRACC
NB1233101573270.9790.1500.934
J48124050624200.9840.0740.964
RF125040634100.9920.0590.974
IRF12543164360.9950.0460.981

Share and Cite

MDPI and ACS Style

Kumar, R.; Zhang, X.; Khan, R.U.; Sharif, A. Research on Data Mining of Permission-Induced Risk for Android IoT Devices. Appl. Sci. 2019, 9, 277. https://doi.org/10.3390/app9020277

AMA Style

Kumar R, Zhang X, Khan RU, Sharif A. Research on Data Mining of Permission-Induced Risk for Android IoT Devices. Applied Sciences. 2019; 9(2):277. https://doi.org/10.3390/app9020277

Chicago/Turabian Style

Kumar, Rajesh, Xiaosong Zhang, Riaz Ullah Khan, and Abubakar Sharif. 2019. "Research on Data Mining of Permission-Induced Risk for Android IoT Devices" Applied Sciences 9, no. 2: 277. https://doi.org/10.3390/app9020277

APA Style

Kumar, R., Zhang, X., Khan, R. U., & Sharif, A. (2019). Research on Data Mining of Permission-Induced Risk for Android IoT Devices. Applied Sciences, 9(2), 277. https://doi.org/10.3390/app9020277

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop