{"title":"Android malware detection using the dendritic cell algorithm","authors":"Deniel V. Ng, J. G. Hwang","doi":"10.1109/ICMLC.2014.7009126","DOIUrl":null,"url":null,"abstract":"Most smartphones run on Android OS, which facilitates the installation of third-party applications. Unfortunately, malware also exists for the Android. Malware can perform various harmful activities. In this paper, we have collected the behaviors of 100 Android applications. These collected applications consist of 50 benign applications and 50 pieces of malware. The invoked system calls were logged to serve as the behaviors of these applications. Then, the data were input to the dendritic cell algorithm (DCA). The DCA was inspired by a danger model of the human immune system and is able to detect anomalies. We used the features of the DCA to perform anomaly detection and classified the collected applications as either benign or malicious. Our experiment results showed that the DCA could achieve a higher accuracy than either the decision tree, the naive Bayes, or the support vector machine.","PeriodicalId":335296,"journal":{"name":"2014 International Conference on Machine Learning and Cybernetics","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Machine Learning and Cybernetics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMLC.2014.7009126","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 16
Abstract
Most smartphones run on Android OS, which facilitates the installation of third-party applications. Unfortunately, malware also exists for the Android. Malware can perform various harmful activities. In this paper, we have collected the behaviors of 100 Android applications. These collected applications consist of 50 benign applications and 50 pieces of malware. The invoked system calls were logged to serve as the behaviors of these applications. Then, the data were input to the dendritic cell algorithm (DCA). The DCA was inspired by a danger model of the human immune system and is able to detect anomalies. We used the features of the DCA to perform anomaly detection and classified the collected applications as either benign or malicious. Our experiment results showed that the DCA could achieve a higher accuracy than either the decision tree, the naive Bayes, or the support vector machine.