{"title":"Detecting Malware in Android Applications by Using Androguard Tool and XGBoost Algorithm","authors":"Uday Sai Kumar, Ashok Yadav, Vrijendra Singh","doi":"10.1109/UPCON56432.2022.9986470","DOIUrl":null,"url":null,"abstract":"Android is the most popular operating system for smartphones and tablets. With its popularity, Android mal ware has also grown dramatically. Many conventional malware detection techniques are now not sufficient, due to sophisticated detection avoidance strategies. According to ongoing research, one harmful Android software is released every 10 seconds. To counter these significant mal ware campaigns, scalable detection approaches require that can provide quick and accurate identification of mal ware apps. To overcome the above issues, we proposed a method to detect malware in Android applications by extracting features like activities, services, requested permissions, and intent filters from the manifest file. Furthermore, the androguard tool is used to disassemble the code and extract all suspicious API calls by reading the dex code. These extracted features are serialized in feather data format for efficient retrieval. After that, the XGBoost algorithm is used to detect the malware. The result of the proposed method gives 97% accuracy.","PeriodicalId":185782,"journal":{"name":"2022 IEEE 9th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 9th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UPCON56432.2022.9986470","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Android is the most popular operating system for smartphones and tablets. With its popularity, Android mal ware has also grown dramatically. Many conventional malware detection techniques are now not sufficient, due to sophisticated detection avoidance strategies. According to ongoing research, one harmful Android software is released every 10 seconds. To counter these significant mal ware campaigns, scalable detection approaches require that can provide quick and accurate identification of mal ware apps. To overcome the above issues, we proposed a method to detect malware in Android applications by extracting features like activities, services, requested permissions, and intent filters from the manifest file. Furthermore, the androguard tool is used to disassemble the code and extract all suspicious API calls by reading the dex code. These extracted features are serialized in feather data format for efficient retrieval. After that, the XGBoost algorithm is used to detect the malware. The result of the proposed method gives 97% accuracy.