Android Malware Characterization Using Metadata and Machine Learning Techniques

Android malware has emerged as a consequence of the increasing popularity of smartphones and tablets. While most previous work focuses on inherent characteristics of Android apps to detect malware, this study analyses indirect features and metadata to identify patterns in malware applications. Our e...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Security and communication networks Ročník 2018; číslo 2018; s. 1 - 11
Hlavní autoři: Guzmán, Antonio, Muñoz, Alfonso, Hernández, José Alberto, Martín, Ignacio
Médium: Journal Article
Jazyk:angličtina
Vydáno: Cairo, Egypt Hindawi Publishing Corporation 01.01.2018
Hindawi
John Wiley & Sons, Inc
Témata:
ISSN:1939-0114, 1939-0122
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Android malware has emerged as a consequence of the increasing popularity of smartphones and tablets. While most previous work focuses on inherent characteristics of Android apps to detect malware, this study analyses indirect features and metadata to identify patterns in malware applications. Our experiments show the following: (1) the permissions used by an application offer only moderate performance results; (2) other features publicly available at Android markets are more relevant in detecting malware, such as the application developer and certificate issuer; and (3) compact and efficient classifiers can be constructed for the early detection of malware applications prior to code inspection or sandboxing.
AbstractList Android malware has emerged as a consequence of the increasing popularity of smartphones and tablets. While most previous work focuses on inherent characteristics of Android apps to detect malware, this study analyses indirect features and metadata to identify patterns in malware applications. Our experiments show the following: (1) the permissions used by an application offer only moderate performance results; (2) other features publicly available at Android markets are more relevant in detecting malware, such as the application developer and certificate issuer; and (3) compact and efficient classifiers can be constructed for the early detection of malware applications prior to code inspection or sandboxing.
Author Hernández, José Alberto
Martín, Ignacio
Muñoz, Alfonso
Guzmán, Antonio
Author_xml – sequence: 1
  fullname: Guzmán, Antonio
– sequence: 2
  fullname: Muñoz, Alfonso
– sequence: 3
  fullname: Hernández, José Alberto
– sequence: 4
  fullname: Martín, Ignacio
BookMark eNqFkE1Lw0AQhhepYFu9eZaAR43d2ew2ybEUv6Cll_YcJvtht9RN3Wwp-utNTFEQxNMMzPPOC8-A9FzlNCGXQO8AhBgxCtlIpDznGZyQPuRJHlNgrPe9Az8jg7reUDoGnvI-WUyc8pVV0Ry3B_Q6mq7Rowza2w8MtnLRqrbuJZrrgAoDRuhaVq6t09FMo3ftdanl2tm3va7PyanBba0vjnNIVg_3y-lTPFs8Pk8ns1gmYxpixoXKM8OSjOaiLGUpDWg-1gYYmrSULONGjVGgZEmpFFdpqjgFLjWUtKQ8GZLr7u_OV21vKDbV3rumsmh-izRLMy4a6rajpK_q2mtT7Lx9Rf9eAC1aZUWrrDgqa3D2C5c2fFkIHu32r9BNF2qUKDzY_yquOlo3jDb4QzPgLGHJJ63Xh0E
CitedBy_id crossref_primary_10_1109_ACCESS_2020_2965646
crossref_primary_10_1007_s11042_022_13767_2
crossref_primary_10_1155_2019_5121054
crossref_primary_10_1007_s11036_019_01248_0
crossref_primary_10_1016_j_sysarc_2022_102543
crossref_primary_10_1109_TIFS_2022_3180184
crossref_primary_10_1109_ACCESS_2021_3107903
crossref_primary_10_1016_j_cose_2020_101972
crossref_primary_10_1109_ACCESS_2020_3002842
crossref_primary_10_1109_ACCESS_2025_3577941
crossref_primary_10_32604_cmc_2023_039721
crossref_primary_10_3233_JCS_200095
crossref_primary_10_1155_2021_8814844
crossref_primary_10_1109_ACCESS_2022_3149053
Cites_doi 10.1016/j.cose.2014.11.001
10.1016/j.cose.2016.11.007
10.1016/j.cose.2013.02.002
10.15394/jdfsl.2013.1149
10.1049/iet-ifs.2014.0099
10.1016/j.pmcj.2016.06.018
10.1049/iet-ifs.2013.0095
10.1155/2008/712353
10.1007/s10844-010-0148-x
10.1007/978-3-319-04283-1_6
10.1007/978-3-642-33018-6_30
10.1007/978-1-4614-7138-7
ContentType Journal Article
Copyright Copyright © 2018 Ignacio Martín et al.
Copyright © 2018 Ignacio Martín et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0
Copyright_xml – notice: Copyright © 2018 Ignacio Martín et al.
– notice: Copyright © 2018 Ignacio Martín et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0
DBID ADJCN
AHFXO
RHU
RHW
RHX
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1155/2018/5749481
DatabaseName الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals
معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete
Hindawi Publishing Complete
Hindawi Publishing Subscription Journals
Hindawi Publishing Open Access
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList

Technology Research Database
CrossRef
Database_xml – sequence: 1
  dbid: RHX
  name: Hindawi Publishing Open Access
  url: http://www.hindawi.com/journals/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1939-0122
Editor Zeadally, Sherali
Editor_xml – sequence: 1
  givenname: Sherali
  surname: Zeadally
  fullname: Zeadally, Sherali
EndPage 11
ExternalDocumentID 10_1155_2018_5749481
1214232
GrantInformation_xml – fundername: Spanish project TEXEO
  grantid: TEC2016-80339-R
– fundername: EU-funded H2020 TYPES project
  grantid: H2020-653449
GroupedDBID .4S
.DC
05W
0R~
123
24P
31~
3SF
4.4
52U
5DZ
66C
8-1
8UM
AAESR
AAEVG
AAFWJ
AAMMB
AANHP
AAONW
AAZKR
ACBWZ
ACCMX
ACGFO
ACRPL
ACXQS
ACYXJ
ADBBV
ADIZJ
ADJCN
ADMLS
ADNMO
AEFGJ
AEIMD
AENEX
AFBPY
AGQPQ
AGXDD
AHFXO
AIDQK
AIDYY
AJXKR
ALMA_UNASSIGNED_HOLDINGS
AMBMR
ARCSS
ASPBG
ATUGU
AVWKF
AZFZN
AZVAB
BCNDV
BDRZF
BHBCM
BNHUX
BOGZA
BRXPI
CS3
DR2
DU5
EBS
EIS
EJD
F1Z
FEDTE
G-S
GODZA
H13
HVGLF
HZ~
IX1
LH4
LITHE
LW6
MY.
MY~
NNB
O9-
OIG
OK1
P2P
PUEGO
ROL
SUPJJ
TH9
TUS
W99
WBKPD
XV2
1OC
AAJEY
AFKRA
ARAPS
BENPR
BGLVJ
CCPQU
GROUPED_DOAJ
HCIFZ
IAO
ICD
ITC
K7-
PIMPY
RHU
RHW
RHX
AAYXX
ALUQN
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c360t-245d98f238095bbcbcf1e46ef12af7bc284fd6a5ac23bdd4d77d4014ce1b0b043
IEDL.DBID RHX
ISICitedReferencesCount 19
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000439809000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1939-0114
IngestDate Fri Jul 25 09:17:30 EDT 2025
Sat Nov 29 02:59:30 EST 2025
Tue Nov 18 20:39:32 EST 2025
Sun Jun 02 18:54:25 EDT 2024
Thu Sep 25 15:13:57 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 2018
Language English
License This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
http://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c360t-245d98f238095bbcbcf1e46ef12af7bc284fd6a5ac23bdd4d77d4014ce1b0b043
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-1217-7546
OpenAccessLink https://dx.doi.org/10.1155/2018/5749481
PQID 2455787845
PQPubID 1046363
PageCount 11
ParticipantIDs proquest_journals_2455787845
crossref_primary_10_1155_2018_5749481
crossref_citationtrail_10_1155_2018_5749481
hindawi_primary_10_1155_2018_5749481
emarefa_primary_1214232
PublicationCentury 2000
PublicationDate 2018-01-01
PublicationDateYYYYMMDD 2018-01-01
PublicationDate_xml – month: 01
  year: 2018
  text: 2018-01-01
  day: 01
PublicationDecade 2010
PublicationPlace Cairo, Egypt
PublicationPlace_xml – name: Cairo, Egypt
– name: London
PublicationTitle Security and communication networks
PublicationYear 2018
Publisher Hindawi Publishing Corporation
Hindawi
John Wiley & Sons, Inc
Publisher_xml – name: Hindawi Publishing Corporation
– name: Hindawi
– name: John Wiley & Sons, Inc
References 11
22
12
23
14
3
6
7
8
(25) 2008; 4
(17) 2013; 2
30
10
References_xml – volume: 2
  start-page: 228
  issue: 3
  year: 2013
  ident: 17
  publication-title: Internation Jouranl of Scientific and Technology Research
– ident: 10
  doi: 10.1016/j.cose.2014.11.001
– ident: 6
  doi: 10.1016/j.cose.2016.11.007
– ident: 22
  doi: 10.1016/j.cose.2013.02.002
– ident: 23
  doi: 10.15394/jdfsl.2013.1149
– ident: 7
  doi: 10.1049/iet-ifs.2014.0099
– ident: 11
  doi: 10.1016/j.pmcj.2016.06.018
– ident: 3
  doi: 10.1049/iet-ifs.2013.0095
– volume: 4
  start-page: 33
  issue: 1
  year: 2008
  ident: 25
  publication-title: Mobile Information Systems
  doi: 10.1155/2008/712353
– ident: 12
  doi: 10.1007/s10844-010-0148-x
– ident: 14
  doi: 10.1007/978-3-319-04283-1_6
– ident: 8
  doi: 10.1007/978-3-642-33018-6_30
– ident: 30
  doi: 10.1007/978-1-4614-7138-7
SSID ssj0061474
Score 2.219399
Snippet Android malware has emerged as a consequence of the increasing popularity of smartphones and tablets. While most previous work focuses on inherent...
SourceID proquest
crossref
hindawi
emarefa
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms Accuracy
Applications programs
Classification
Datasets
Inspection
Machine learning
Malware
Metadata
Smartphones
Support vector machines
Tablet computers
Trends
User behavior
Title Android Malware Characterization Using Metadata and Machine Learning Techniques
URI https://search.emarefa.net/detail/BIM-1214232
https://dx.doi.org/10.1155/2018/5749481
https://www.proquest.com/docview/2455787845
Volume 2018
WOSCitedRecordID wos000439809000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVWIB
  databaseName: Wiley Online Library Open Access
  customDbUrl:
  eissn: 1939-0122
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0061474
  issn: 1939-0114
  databaseCode: 24P
  dateStart: 20170101
  isFulltext: true
  titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html
  providerName: Wiley-Blackwell
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF5ssaAH8W21lj3UkwS6yebRoxRLL9YiFXoL-4oWaipNtH_fmWRTH0X0lsBkIDPZ_fbLzn5DSIfhmj_whcNMGDh4VhLGnOGOy5SrANIT5ZXNJsLRKJpOe2MrkpRtbuED2gE9ZxHwdtQxAZpTi3ys3HoYTqsJFwAmtJvHWPrDeFXf_uPZb8jTMC8CLgCOGs9Iflezjcm4QJjBPtmzS0N6U-bygGyZ9JDsfhEMPCL3WH-4mGl6J-Yr8Ez7a73l8jglLUoA6J3JBdZ-UpGiLdZLGmqlVJ_opNJtzY7J4-B20h86tiWCo7ygmzsu93UvSgBnIY5SKqkSZnhgEuaKJJQKwCbRgfCFcj2pNddhqIFBcWWY7Mou905IPV2k5oxQYKcyAH9ehK2KGJNJYsJIA0URCjV4muS6ClesrF44tq2YxwVv8P0Ygxvb4DbJ1dr6tdTJ-MXu1Eb-0wxV3zy3STo2E384aFVpiu1wy2J4DZx5Iu6f_8_LBdnB2_JfSovU8-WbuSTb6j2fZcs2qbl83C4-sg9EwsXm
linkProvider Hindawi Publishing
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Android+Malware+Characterization+Using+Metadata+and+Machine+Learning+Techniques&rft.jtitle=Security+and+communication+networks&rft.au=Mart%C3%ADn%2C+Ignacio&rft.au=Hern%C3%A1ndez%2C+Jos%C3%A9+Alberto&rft.au=Mu%C3%B1oz%2C+Alfonso&rft.au=Guzm%C3%A1n%2C+Antonio&rft.date=2018-01-01&rft.pub=John+Wiley+%26+Sons%2C+Inc&rft.issn=1939-0114&rft.eissn=1939-0122&rft.volume=2018&rft_id=info:doi/10.1155%2F2018%2F5749481&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1939-0114&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1939-0114&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1939-0114&client=summon