IDEAS home Printed from https://ideas.repec.org/a/hin/jnlmpe/3842094.html
   My bibliography  Save this article

A Graph-Based Feature Generation Approach in Android Malware Detection with Machine Learning Techniques

Author

Listed:
  • Xiaojian Liu
  • Qian Lei
  • Kehong Liu

Abstract

An explosive spread of Android malware causes a serious concern for Android application security. One of the solutions to detecting malicious payloads sneaking in an application is to treat the detection as a binary classification problem, which can be effectively tackled with traditional machine learning techniques. The key factors in detecting Android malware with machine learning techniques are feature selection and generation . Most of the existing approaches select and generate features without fully examining the structures of programs, and thus the important semantic information associated with these features is lost, consequently resulting in a low accuracy rate in detection. To address this issue, we propose a new feature generation approach for Android applications, which takes components and program structures into consideration and extracts features in a graph-based and semantics-rich style. This approach highlights two major distinguishing aspects: the context-based feature selection and graph-based feature generation . We abstract an Android application as a collection of reduced iCFGs (interprocedural control flow graphs) and extract original features from these graphs. Combining the original features and their contexts together, we generate new features which hold richer semantic information than the original ones. By embedding the features into a feature vector space, we can use machine learning techniques to train a malware detector. The experiment results show that this approach achieves an accuracy rate of 95.4% and a recall rate of 96.5%, which prove the effectiveness and advantages of our approach.

Suggested Citation

  • Xiaojian Liu & Qian Lei & Kehong Liu, 2020. "A Graph-Based Feature Generation Approach in Android Malware Detection with Machine Learning Techniques," Mathematical Problems in Engineering, Hindawi, vol. 2020, pages 1-15, May.
  • Handle: RePEc:hin:jnlmpe:3842094
    DOI: 10.1155/2020/3842094
    as

    Download full text from publisher

    File URL: http://downloads.hindawi.com/journals/MPE/2020/3842094.pdf
    Download Restriction: no

    File URL: http://downloads.hindawi.com/journals/MPE/2020/3842094.xml
    Download Restriction: no

    File URL: https://libkey.io/10.1155/2020/3842094?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:hin:jnlmpe:3842094. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Mohamed Abdelhakeem (email available below). General contact details of provider: https://www.hindawi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.