android malware detection through application permission - Universiti [PDF]

mengaku membenarkan tesis (PSM/Sarjana/Doktor Falsafah) ini disimpan di Perpustakaan. Fakulti Teknologi Maklumat dan Kom

5 downloads 28 Views 432KB Size

Recommend Stories


permission based malware detection analysis in android applications uğur pehli̇van september
Goodbyes are only for those who love with their eyes. Because for those who love with heart and soul

Drebin: Effective and Explainable Detection of Android Malware
Where there is ruin, there is hope for a treasure. Rumi

Comparative Evaluation of Machine Learning-based Malware Detection on Android
When you talk, you are only repeating what you already know. But if you listen, you may learn something

Research Article Runtime Detection Framework for Android Malware - Hindawi
Raise your words, not voice. It is rain that grows flowers, not thunder. Rumi

Malware Detection in Android Mobile Platform using Machine Learning Algorithms
Every block of stone has a statue inside it and it is the task of the sculptor to discover it. Mich

Oral Cancer Detection Using Android Application
Be who you needed when you were younger. Anonymous

PdF Advanced Android Application Development
Happiness doesn't result from what we get, but from what we give. Ben Carson

On-Demand Malware Detection Certification
Open your mouth only if what you are going to say is more beautiful than the silience. BUDDHA

Malware na platformě Android a možnosti zabezpečení
You often feel tired, not because you've done too much, but because you've done too little of what sparks

Android Wireless Application Development 2nd Edition Pdf
If your life's work can be accomplished in your lifetime, you're not thinking big enough. Wes Jacks

Idea Transcript


BORANG PENGESAHAN STATUS TESIS*

JUDUL: ANDROID MALWARE DETECTION THROUGH APPLICATION PERMISSION : AN ANALYSIS ON FEATURE SELECTION AND CLASSIFICATION ALGORITHM SESI PENGAJIAN: 2014/2015 Saya MOHD SHAHRULAZAM BIN SAMSUDIN mengaku membenarkan tesis (PSM/Sarjana/Doktor Falsafah) ini disimpan di Perpustakaan Fakulti Teknologi Maklumat dan Komunikasi dengan syarat-syarat kegunaan seperti berikut: 1. Tesis dan projek adalah hakmilik Universiti Teknikal Malaysia Melaka. 2. Perpustakaan Fakulti Teknologi Maklumat dan Komunikasi dibenarkan membuat

salinan untuk tujuan pengajian sahaja. 3. Perpustakaan Fakulti Teknologi Maklumat dan Komunikasi dibenarkan membuat

salinan tesis ini sebagai bahan pertukaran antara institusi pengajian tinggi. 4. ** Sila tandakan (/)

_______

SULIT

(Mengandungi maklumat yang berdarjah keselamatan atau kepentingan Malaysia seperti yang termaktub di dalam AKTA RAHSIA RASMI 1972)

TERHAD

(Mengandungi maklumat TERHAD yang telah ditentukan oleh organisasi/badan di mana penyelidikan dijalankan)

TIDAK TERHAD

_________________________ (TANDATANGAN PENULIS)

__________________________ (TANDATANGAN PENYELIA)

Alamat tetap: NO.24, JALAN ROTAN 5,

EN MOHD ZAKI BIN MAS’UD

TAMAN SRI PULAI, 81300 SKUDAI,

Nama Penyelia

JOHOR BAHRU, JOHOR Tarikh: 24 August 2015 CATATAN:

Tarikh: 24 August 2015

* Tesis dimaksudkan sebagai Laporan Akhir Projek Sarjana Muda (PSM) ** Jika tesis ini SULIT atau TERHAD, sila lampirkan surat daripada pihak berkuasa.

ANDROID MALWARE DETECTION THROUGH APPLICATION PERMISSION : AN ANALYSIS ON FEATURE SELECTION AND CLASSIFICATION ALGORITHM

MOHD SHAHRULAZAM BIN SAMSUDIN

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

BORANG PENGESAHAN STATUS TESIS*

JUDUL: ANDROID MALWARE DETECTION THROUGH APPLICATION PERMISSION : AN ANALYSIS ON FEATURE SELECTION AND CLASSIFICATION ALGORITHM SESI PENGAJIAN: 2014/2015 Saya MOHD SHAHRULAZAM BIN SAMSUDIN mengaku membenarkan tesis (PSM/Sarjana/Doktor Falsafah) ini disimpan di Perpustakaan Fakulti Teknologi Maklumat dan Komunikasi dengan syarat-syarat kegunaan seperti berikut: 1. Tesis dan projek adalah hakmilik Universiti Teknikal Malaysia Melaka. 2. Perpustakaan Fakulti Teknologi Maklumat dan Komunikasi dibenarkan

membuat salinan untuk tujuan pengajian sahaja. 3. Perpustakaan Fakulti Teknologi Maklumat dan Komunikasi dibenarkan

membuat salinan tesis ini sebagai bahan pertukaran antara institusi pengajian tinggi. 4. ** Sila tandakan (/)

_______

SULIT

(Mengandungi maklumat yang berdarjah keselamatan atau kepentingan Malaysia seperti yang termaktub di dalam AKTA RAHSIA RASMI 1972)

TERHAD

(Mengandungi maklumat TERHAD yang telah ditentukan oleh organisasi/badan di mana penyelidikan dijalankan)

TIDAK TERHAD

_________________________ (TANDATANGAN PENULIS)

___________________________ (TANDATANGAN PENYELIA)

Alamat tetap: No.24, Jalan Rotan 5,

_________________________

Taman Sri Pulai, 81300 Skudai,

Nama Penyelia

Johor Bahru, Johor Tarikh: 25 August 2015 CATATAN:

Tarikh: _________________

* Tesis dimaksudkan sebagai Laporan Akhir Projek Sarjana Muda (PSM) ** Jika tesis ini SULIT atau TERHAD, sila lampirkan surat daripada pihak berkuasa.

ANDROID MALWARE DETECTION THROUGH APPLICATION PERMISSION : AN ANALYSIS ON FEATURE SELECTION AND CLASSIFICATION ALGORITHM

MOHD SHAHRULAZAM BIN SAMSUDIN

This report is submitted in partial fulfillment of the requirements for the Bachelor of Computer Science (Computer Networking)

FACULTY OF INFORMATION AND COMMUNICATION TECHNOLOGY UNIVERSITI TEKNIKAL MALAYSIA MELAKA 2015

i

DECLARATION

I here declare that this project report entitled ANDROID MALWARE DETECTION THROUGH APPLICATION PERMISSION : AN ANALYSIS ON FEATURE SELECTION AND CLASSIFICATION ALGORITHM

is written by me and is my own effort and that no part has been plagiarized without citations.

STUDENT

:

Date:_________

(MOHD SHAHRULAZAM BIN SAMSUDIN) SUPERVISOR: (EN MOHD ZAKI BIN MAS’UD)

Date:__________

ii

DEDICATION

This thesis is dedicated to my parent, who always taught me to perform and focus whatever work you been doing for the sake of your future and always remind me to gain knowledge as much as possible to be success in your life. They also taught me to finished whatever task or job that have you started by following to the schedule that have been created.

iii

ACKNOWLEDGEMENTS

First and foremost, I would like to give a big appreciation to my supervisor, En Mohd Zaki Bin Mas’ud who assist, encourage and comment my project until the very end of the project. He is a very expert supervisor for me to carry out this project. Thank you for all your guidance, encouraged and comment till I able to finish my project.

My second appreciation to Saidah Mastura Binti Abdul Ghani who guide me during the first start-up of my final year project. You have become are my second supervisor that had helped me at the beginning of this research. I am appreciate with all your guide that have been taught.

Thanks to all my colleagues Nurfarah Athira Binti Muhammad Tuah, Nor Amira Binti Mohd Hurriff, Siti Roaiza Binti Mohd Yusoff and Fatin Athirah Binti Mohamed Nordin who had helped me a lot in completing and handle the big data. I thank all of them for their contribution and willingness to help me complete the project research.

iv

ABSTRACT

In this technology era Internet of Thing(IoT), where everything or gadget are connected to the internet with no exception of android smartphone which had become vital accessory for everyone. As the number of android user grows up every year, more user are vulnerable to malware application on their smartphone which can widespread in the network within a seconds to perform malicious activity. Regardless of the new advancement technology shown in every new model introduce every year, the malware also evolve to achieve it target. Thus, to overcome this issue this research analysis will investigate the use of different feature selection through filter method and different classification algorithm to optimize the android permission to indicate malware application. These feature selection were evaluated through performance parameter to produce the highest accuracy of classification algorithm. Over 500 android application which consist of 250 malware and benign application each were tested with different feature length, feature selection and classification algorithm. For the purpose of studying the android manifest permission, the malware can be identifying by using data mining technique. In testing and validating the parameter of malware permission, this project have 3 types of performance parameter which are accuracy, true positive rate (TPR) and true negative rate (TNR). The result to be achieve the accuracy higher than 80% and lower of true negative rate.

v

ABSTRAK

Dalam era teknologi Internet of Thing(IoT) ini, di mana setiap alat yang disambungkan ke internet tidak terkecuali telefon pintar android yang telah menjadi aksesori penting untuk semua orang. Oleh kerana bilangan pengguna android membesar setiap tahun, banyak pengguna terdedah kepada aplikasi malware pada telefon pintar mereka yang boleh meluas dalam rangkaian dalam sesaat untuk melakukan aktiviti malicous. Tidak kira teknologi kemajuan baru yang ditunjukkan dalam setiap model baru diperkenalkan setiap tahun, malware yang juga berubah untuk mencapai target. Oleh itu, untuk mengatasi isu ini analisis kajian ini akan menyiasat penggunaan pemilihan ciri yang berbeza melalui kaedah penapis dan algoritma pengelasan yang berbeza untuk mengoptimumkan kebenaran android untuk menunjukkan aplikasi malware. Pemilihan ciri dinilai melalui parameter prestasi untuk menghasilkan ketepatan algoritma classfication yang tinggi. Lebih 500 android aplikasi yang terdiri daripada 250 malware dan aplikasi berbahaya setiap satu telah diuji dengan panjang ciri-ciri yang berbeza, pemilihan ciri dan algoritma pengelasan. Untuk tujuan pembelajaran kebenaran android aplikasi, malware boleh di kenal pasti dengan menggunakan teknik pengecilan data. Dalam ujian dan mengesahkan parameter kebenaran malware, projek ini mempunyai 3 jenis parameter prestasi yang tepat, kadar benar positif (TPR) dan kadar negatif benar (TNR). Hasilnya untuk mencapai ketepatan yang lebih tinggi daripada 80% dan rendah daripada kadar negatif benar.

vi

TABLE OF CONTENTS

CHAPTER I

DECLARATION

i

DEDICATION

ii

ACKNOWLEDGEMENTS

iii

ABSTRACT

iv

ABSTRAK

v

TABLE OF CONTENTS

vi

LIST OF TABLES

x

LIST OF FIGURES

xi

INTRODUCTION 1.1

Project Background

1

1.2

Problem statement

4

1.3

Objective

5

1.4

Scope

6

1.5

Project significance

6

1.6

Report Organization

6

1.7

Summary

7

vii CHAPTER II

CHAPTER III

LITERATURE REVIEW 2.1

Introduction

8

2.2

Related Work

9

2.2.1

Existing System

10

2.2.2

Android

11

2.2.3

Android architecture

13

2.2.4

Malware

15

2.4.1

Malware category

16

2.3

Machine Learning

22

2.4

Analysis Technique

23

2.5

Parameter

28

2.6

Conclusion

29

METHODOLOGY 3.1

Introduction

30

3.2

Methodology

31

3.2.1

Phase I: Literature review

32

3.2.2

Phase II: Analysis

32

3.2.3

Phase III: Design & Implementation

33

3.2.4

Phase V: Testing & Evaluate

34

3.3

Project Schedule & Milestones

35

3.4

Conclusion

36

viii CHAPTER IV

CHAPTER V

DESIGN 4.1

Introduction

37

4.2

Malware analysis Architecture

38

4.2.1

Feature Extraction

38

4.2.2

Feature Refinement

38

4.2.3

Feature Selection

44

4.2.4

Performance Evaluation

44

4.3

Malware and Benign Data Collected

45

4.4

Parameter of android permission

47

4.5

Software and hardware requirement

47

4.6

Conclusion

48

IMPLEMENTATION 5.1

Introduction

49

5.2

Environment Setup

50

5.2.1

Accuracy analysis arhitecture

50

5.2.2

Analysis Variables of Feature Selection

51

5.2.3

Analysis Variables of Classifications

52

Algorithm 5.2.4

Performance Parameters

53

5.2.5

Flow Chart Process using WEKA data

55

mining tool. 5.3

Conclusion

56

ix CHAPTER VI

CHAPTER VII

TESTING AND ANALYSIS 6.1

Introduction

57

6.2

Testing and Analysis

58

6.3

Conclusion

63

PROJECT CONCLUSION 7.1

Introduction

64

7.2

Research Summarization

65

7.3

Research Contribution

65

7.4

Research Limitation

66

7.5

Future Works

66

7.6

Conclusion

66

REFERENCES

67

APPENDIX

70

x

LIST OF TABLES

TABLE

TITLE

PAGE

1.1

Summary of Research Problem

4

1.2

Summary of Research Question

4

1.3

Summary of Research Objective

5

2.1

Malware Category and its Definition

17

2.2

Advantage and Disadvantage Features Selection Machine Learning

25

4.1

Top 3 Android Permission

46

5.1

Feature Selection Method

51

5.2

Classifications Algorithm

53

6.1

Performance Parameter

58

6.2

Classification Algorithms (Accuracy)

59

6.3

Area Under Curve (AUC)

61

xi

LIST OF FIGURES

DIAGRAM

TITLE

PAGE

1.1

Worldwide Smartphone OS Market Share (IDC, 2014)

2

1.2

The Growth of Android Malware from 2011 to 2014 (Quick Heal

3

Threat Research Labs, 2014) 2.2

Evolution of Android

11

2.3

International Data Corporation (IDC)

12

2.4

Android Architecture System (Armando et al., 2012)

13

2.5

Java Translated into DEX Bytecode

15

2.6

Malware Category

16

2.7

Kaspersky Mobile Cyber Threat 2014

19

3.1

Research Process Flow

31

3.2

Project Milestones

35

3.3

Project Gantt Chart

36

4.1

Analysis Design

38

4.2

Flow Chart of Benign APK File is Collected

39

4.3

Flow Chart of Malware APK File is Collected

40

4.4

Flow Chart of Analysis Benign and Malware APK File by Using

41

Androguard 4.5

Android Permission Used in Malware Application

45

4.6

Android Permission Used in Benign Application

46

5.1

Performance Parameter Architecture

50

5.2

Flow chart of WEKA tools process

55

6.1

Accuracy Classification Algorithm Bar Chart

60

6.2

Area Under Curve (AUC) Bar Chart

62

6.3

Highest Area Under Curve (AUC)

63

1

CHAPTER 1

INTRODUCTION

1.1 Project Background The new era of technology has become tremendously arise in smartphone usage among people as a medium of a communication and social networking where everyone is keep busying typing a message to their loving one. Google’s Android Operating System(OS) is one of a very well-known and popular smartphone operating system which cover major smartphone operating system instead of another popular smartphone iOS by apple. From the statistic gained from International Data Corporation(IDC) in quarter of 2014, Android OS was the highest worldwide smartphone OS market share among the other OS smartphone as shown in Figure 1.1. Moreover, according to trend now Android OS has become most vulnerable smartphone OS to malware which increase year after year as shown in Figure 1.2.

2

Figure 1.1: Worldwide Smartphone OS Market Share (IDC, 2014)

3

Figure 1.2: The Growth of Android Malware from 2011 to 2014 (Quick Heal Threat Research Labs, 2014) Malicious software or application which is define as malware is written by unknown people are purposely release mostly for mischievous act such as stealing android user credential information, sending text without the user knowledge, spamming and web browser search optimization. Malware is general name where can be in the form of Trojan, Virus, Botnet and Worm which are unusually found in android device but are synonym to personal computer desktop. In this advance mobile android technology where every year has the new reveal up to date smartphone by competitive smartphone company such as Samsung, Lenovo and Asus try to attract many customer with sophisticated functions meanwhile malware also evolve and not to miss but become the next target of android smartphone device.

4 1.2 Problem Statements Android smartphone nowadays are widely vulnerable to malware where it can be easily widespread rapidly within a seconds in the network. Thus the study research about malware permission need to carry out to identify this malware. The research problem (RP) is summarized into Table 1.1 Table 1.1 Summary of Research Problem No

Research Problem

RP1 Malware are updated with new unknown signature gives difficulty in malware detection and prevention. Thus, one Research Question (RQ) is built to identify the research problem as discussed in previous section is explain in table 1.2 Table 1.2 Summary of Research Question RP

RQ

Research Question

RP1

RQ1 How to identify android malware permission?

This research question is done by considering the malware’s permission which is highlighted in RP1 in Table 1.1. This research question (RQ) is the primary guides to formulate the research objective (RO) of this project.

5 1.3 Objectives

According on the research questions formulated in previous section, appropriate Research Objectives (RO) are developed as follows and the Research Objective (RO) are summarized as shown below in table 1.3. RO 1: To study about the parameter of android malware’s permission.  The static analysis of reverse engineering need to be carry out in order to identify and compare the permission contain in benign and malware APK file.

RO 2: To compare the permission of android in benign and malware APK file.  To detect the permission comparison, we need to know what type of permission usually contain in benign and malware APK file. RO 3: To generate the graph of android permission in benign and malware APK file.  The graph show containing android permission in benign and malware APK file which will be analyze through investigation of static analysis reverse engineering. Table 1.3 Summary of Research Objective RP RQ RO

Research Objective

RO1 To study about the parameter of android malware permission. RO2 To compare the android permission contain in benign and malware APK file of android RO3 To generate the graph of android permission contain in benign and malware APK file of android

6 1.4 Scopes 1. Type of analyze android malware permission are specific which is static analysis instead of dynamic analysis 2. Feature selection of filter is choose as a technique to classify malware 3. Classification is use to evaluate feature selection performance 1.5 Project Significance

1. APK file extraction using Androguard is used 2. Benign and malware permission graph is generated 3. Type permission used in benign and malware are identify and analyzed

1.6 Report Organization

To assure this research is run in progressing smoothly and successfully, report organization is constructed in order to arrange chapter by chapter respectively. The summarization and description of each chapter are been depicted below: Chapter 1: Introduction This chapter review on introduction, project background, research problems, research questions, research objectives, scopes, project significant and report organization. Chapter 2: Literature Review In this chapter, all related study about malware permission, static analysis technique and feature selection were done. The output of the study will be utilized in the following chapter which in the methodology

7 Chapter 3: Methodology In this chapter, project methodology will be discuss according to activities, step taken and stage followed in order to make sure this project run smoothly in sequence and priority. Chapter 4: Design and Implementation This chapter show the selected parameter are collected and analysed to identify android permission contain in benign and malware APK file. The output of the data, will be used to construct and generate a graph of benign and malware android permission. Then, the graph can be interpret into percentage of type android permission contain in benign and malware APK file. Chapter 5: Testing and Analysis The chapter 5 will be showing the steps and methods in testing and analyzing the data collected. After that, the result of comparative analysis will be discuss and explain in detail. Chapter 6: Conclusion The conclusion are make based on summarization of whole work that have done.

1.7 Summary In conclusion, this research are mainly to identify and analyze the behavior of android malware through static analysis. In the next chapter, research about the malware behavior will be in the form of literature review

8

CHAPTER II

LITERATURE REVIEW

2.1 Introduction

In this chapter 2, literature review of regarding topics malware shall be discussed. All the findings from the literature review which tell about the malware issues will be gathered and compiled resources from any relevant literatures and thesis, journals, article, books, internet, report or other knowledge resources that are used to write this literature review. Figure 2.1 below show the Literature Review Operational Framework of this research.

9 Evolution of Android Android Architecture Android Malware Category Malware

Machine learning

Analysis Technique

Parameter

Structure APK

Android Permission

Feature selection in mobile malware detection

Feature selection recommendation

Figure 2.1: Literature Review Operational Framework

2.2 Related Work

Significant amount of research has been done in past to detect malware using windows PE file format. Moreover, many anti-malware vendors have adopted different methods to identify the malicious executables. Researcher and malware analysts have applied different approaches in determining the process to detect malware by using static or dynamic malware analysis technique. Additionally various data mining technique have also been used. The following sections discuss the related work.

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.