WRAPPER-BASED METAHEURISTIC OPTIMIZATION ALGORITHMS FOR ANDROID MALWARE DETECTION: A CORRELATIVE ANALYSIS OF FIREFLY, BAT & WHALE OPTIMIZATION

Santosh Jhansi K Centurion University of Technology and Management, Odisha, India
Sujatha Chakravarthy Centurion University of Technology and Management, Bhuvaneswar, India
Ravi Kiran Varma P Maharaj Vijayaram Gajapathi Raj College of Engineering, Vizianagaram, India

Abstract

Recently, Android malware threats have been increasing at a rapid pace along with their usage and popularity. Different studies have elucidated the importance of analyzing the Android permissions pattern for the effective detection of Android malware. Optimization of android malware detection with high-dimensional permissions data is a bottleneck, which is a burning issue. In this study, nature-inspired wrapper-based metaheuristic algorithms such as firefly, bat, and whale optimization algorithms are investigated for the analysis of different Android permission patterns suitable for malware detection. Different machine learning classification algorithms, such as Linear Regression (LR), Support Vector Machine (SVM), K-Nearest Neighbors (KNN), Decision Tree (DT), Random Forest (RF), Gradient Boosting (GB), and Extreme Learning Machine (ELM) are employed for evaluation. The Wrapper-Based Feature Selection using the Firefly Algorithm (WFSFA) outperformed the other algorithms in terms of feature reduction and recorded an improved classification accuracy of 95.28% when experimented with high-dimensional CICInvesAndMal2019 feature dataset with 4115 features.

Keywords:

Android Security, Malware Analysis, Static Analysis, Feature Selection, Android Malware Classification, Firefly Algorithm (FA), Bat Algorithm (BA), Whale Algorithm (WA).


Full Text:

PDF


References


[1] P.R.K.Varma, K.V.S.Raju and K.P.Raj, "Android mobile security by detecting and classification of malware based on permissions using machine learning algorithms," in International Conference on IoT in Social, Mobile, Analytics and Cloud (I-SMAC), SCAD Institute of Technology, Palladam,India, 2017. [2] N.Anusha and B.Rajalakshmi, "Sensor based application for malware detection in android OS (Operating System) devices," in 2017 International Conference on Information Communication and Embedded Systems (ICICES), Chennai, India, 2017. [3] https://www.techrepublic.com/article/new-android-malware-found-every-10-seconds-report-says/. [Online]. [4] S.H.Moghaddam and M.Abbaspour, "Sensitivity analysis of static features for Android malware detection," in 2014 22nd Iranian Conference on Electrical Engineering (ICEE), Tehran, Iran, 2014. [5] W.Qing-Fei and F.Xiang, "Android Malware Detection Based on Machine Learning," in 2018 4th Annual International Conference on Network and Information Systems for Computers (ICNISC), Wuhan, China, 2018. [6] Taheri, Laya, Kadir, Abdul, Lashkari and A.Habibi, "Extensible Android Malware Detection and Family Classification Using Network-Flows and API-Calls," in 2019 International Carnahan Conference on Security Technology (ICCST), Chennai, India, 2019. [7] P.Xiong, X.Wang, W.Niu, T.Zhu and G.Li, "Android malware detection with contrasting permission patterns," China Communications, vol. 11, no. 8, pp. 1-14, Aug 2014. [8] F.M.Darus, N.A.A.Salleh and A.F.Ariffin, "Android Malware Detection Using Machine Learning on Image Patterns," in 2018 Cyber Resilience Conference (CRC), Putrajaya, Malaysia, 2018. [9] S.Arshad, M.A.Shah, A.Wahid, A.Mehmood, H. Song and H.Yu, "SAMADroid: A Novel 3-Level Hybrid Malware Detection Model for Android Operating System," vol. 6, pp. 4321-4339, 2018. [10] P.Feng, J.Ma, C.Sun, X.Xu and Y.Ma, "A Novel Dynamic Android Malware Detection System With Ensemble Learning," IEEE Access, vol. 6, pp. 30996–31011, 2018. [11] K.Allix, Jerome, T.F.Bissyandé, Klein, State and Y.L.Traon, "A Forensic Analysis of Android Malware -- How is Malware Written and How it Could Be Detected?," in International computer software and applications conference, Vasteras, Sweden, 2014. [12] M.Zaman, T.Siddiqui, M.R.Amin and M.S.Hossain, "Malware detection in Android by network traffic analysis," in 2015 International Conference on Networking Systems and Security (NSysS), Dhaka, Bangladesh, 2015. [13] Z.D.Patel, "Malware Detection in Android Operating System," in 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), Greater Noida, India, 2018. [14] Wang, Li, Hu, Fukuda and Kong, "Multilevel Permission Extraction in Android Applications for Malware Detection," in 2019 International Conference on Computer, Information and Telecommunication Systems (CITS), Beijing, China, 2019. [15] D.Sahın, O.Kural, S.Akleylek and E.Kilig, "New results on permission based static analysis for Android malware," in 2018 6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, Turkey, 2018. [16] E.Elakkiya, S.Selvakumar and R.L.Velusamy, "CIFAS: Community Inspired Firefly Algorithm with fuzzy cross-entropy for feature selection in Twitter Spam detection," in 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), IIT Kharagapur, India, 2020. [17] N.K.Suchetha, A.Nikhil and P.Hrudya, "Comparing the Wrapper Feature Selection Evaluators on Twitter Sentiment Classification," in 2019 International Conference on Computational Intelligence in Data Science (ICCIDS), Gurgaon, India, 2019. [18] Maza and Zouache, "Binary Firefly Algorithm for Feature Selection in Classification," in 2019 International Conference on Theoretical and Applicative Aspects of Computer Science (ICTAACS), Skikda, Algeria, 2019. [19] G.Li and C.Le, "Hybrid Binary Bat Algorithm with Cross-Entropy Method for Feature Selection," in 2019 4th International Conference on Control and Robotics Engineering (ICCRE), Nanjing, China, 2019. [20] Tao, Li and Xu, "Multi-label Feature Selection Method via Maximizing Correlation-based Criterion with Mutation Binary Bat Algorithm," in 2020 International Joint Conference on Neural Networks (IJCNN), Glasgow, UK, 2020. [21] Xu, Fu, C.Fang, Q.Cao, S.Wei and J.Su, "An Improved Binary Whale Optimization Algorithm for Feature Selection of Network Intrusion Detection," in International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS), Lviv, Ukraine, 2018. [22] A.G.Hussien, A.E.Hassanien and E.H.Houssein, "A binary whale optimization algorithm with hyperbolic tangent fitness function for feature selection," in 2017 Eighth International Conference on Intelligent Computing and Information Systems (ICICIS), Cairo, Egypt, 2017. [23] R.B.Hadiprakoso, H.Kabetta and I.K.S.Buana, "Hybrid-Based Malware Analysis for Effective and Efficiency Android Malware Detection," in 2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS), pp. 8-12, Jakarta, Indonesia,2020. [24] E.Amer, "Permission-Based Approach for Android Malware Analysis Through Ensemble-Based Voting Model," in 2021 International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC), pp. 135-139, Cairo, Egypt, 2021. [25] P.Ravi Kiran Varma, S Kumar Reddy Malladi, K.Santosh Jhansi and D.Pushpa Latha, "Bat Optimization Algorithm for wrapper-based feature selection and performace improvement of android malware detection,"IET networks, vol. 10, no. 3, pp. 131-140, Mar 2021. [26] Johari, Nur, Zain, Azlan, Mustaffa, Noorfa, Udin and Amirmudin, "Firefly Algorithm for Optimization Problem," Applied Mechanics and Materials, vol. 421, pp. 512-517, Sep 2013. [27] P.W.Tsai, J.S.Pan, B.Y.Liao, M.J.Tsai and V.Istanda, "Bat Algorithm Inspired Algorithm for Solving Numerical Optimization Problems," Applied Mechanics and Materials, Vols. 148-149, pp. 134-137, 2011. [28] A.Lewis and S.Mirjalili, "The Whale Optimization Algorithm," Advances in Engineering Software, vol. 95, pp. 51-67, 2016. [29] Rehman, Khan, Muhammad, Lee, Lv, Baik, P.A.Shah, K.Awan and Mehmood, "Machine learning-assisted signature and heuristic-based detection of malwares in Android devices," Computers and Electrical Engineering, vol. 69, pp. 821-841, July 2018. [30] M.Kedziora, P.Gawin, I.Jozwiak and M.Szczepanik, "Android Malware Detection Using Machine Learning and Reverse Engineering," in CS & IT Conference Proceedings, Wroclaw University of Science and Technology, Poland, 2018. [31] B.Wu, W.Wen and J.Li, "Android Malware Detection Method Based on frequent Pattern and Weighted Naive Bayes," in Cyber Security, Beijing, China, Springer, 2019, pp. 36-51. [32] V. Grampurohit, "Android App Malware Detection," IIIT, Hyderabad, India, 2016.

Refbacks

  • There are currently no refbacks.