Android Botnet Detection by Classification Techniques

Currently, android botnet attacks have shifted from computers to smartphones due to its functionality, ease to exploit, and based on financial intention. Mostly, the Android malware attack increased due to its popularity and high usage among end users. Android botnet is defined as a collection of co...

Full description

Bibliographic Details
Published in:Advances in Intelligent Systems and Computing
Main Author: Majit A.Z.B.; Shamala P.; Foozy C.F.M.; Wen C.C.; Chinniah M.
Format: Conference paper
Language:English
Published: Springer 2020
Online Access:https://www.scopus.com/inward/record.uri?eid=2-s2.0-85078476738&doi=10.1007%2f978-3-030-36056-6_11&partnerID=40&md5=71d576ee9cbc753789a25376b017324d
id 2-s2.0-85078476738
spelling 2-s2.0-85078476738
Majit A.Z.B.; Shamala P.; Foozy C.F.M.; Wen C.C.; Chinniah M.
Android Botnet Detection by Classification Techniques
2020
Advances in Intelligent Systems and Computing
978 AISC

10.1007/978-3-030-36056-6_11
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85078476738&doi=10.1007%2f978-3-030-36056-6_11&partnerID=40&md5=71d576ee9cbc753789a25376b017324d
Currently, android botnet attacks have shifted from computers to smartphones due to its functionality, ease to exploit, and based on financial intention. Mostly, the Android malware attack increased due to its popularity and high usage among end users. Android botnet is defined as a collection of compromised mobile smartphones and controlled by a botmaster through a command and control (C&C) channel to serve a malicious purpose. Current research are still lacking in terms of their low detection rate due to their selected features. This approach is implemented by extracting two different types of features permissions, software features as well as API calls. Thus, this paper proposes an approach that utilizes ensemble learning for Android malware detection. It combines advantages of static analysis with the efficiency and performance of ensemble machine learning to improve Android malware detection accuracy. For dataset was collected from UNB the Canadian Institute for Cybersecurity dataset and benign from google play. Canadian Institute for Cybersecurity is actually a lightweight method for detection of Android botnet that infers detection patterns automatically and enables identifying botnet directly on the smartphone. The machine learning algorithms used are random forest and naive bayes for classification however while random forest show more accuracy compared with another algorithm. The performance of various classifiers is evaluated by identifying the rate of False Positive and True Positive and accuracy. The results showed that Random Forest Algorithm achieved the highest accuracy rate of 97.1%. In future, more significant approach by using different feature selection such as intent, string and system component will be further explored for a better detection and accuracy rate. © Springer Nature Switzerland AG 2020.
Springer
21945357
English
Conference paper

author Majit A.Z.B.; Shamala P.; Foozy C.F.M.; Wen C.C.; Chinniah M.
spellingShingle Majit A.Z.B.; Shamala P.; Foozy C.F.M.; Wen C.C.; Chinniah M.
Android Botnet Detection by Classification Techniques
author_facet Majit A.Z.B.; Shamala P.; Foozy C.F.M.; Wen C.C.; Chinniah M.
author_sort Majit A.Z.B.; Shamala P.; Foozy C.F.M.; Wen C.C.; Chinniah M.
title Android Botnet Detection by Classification Techniques
title_short Android Botnet Detection by Classification Techniques
title_full Android Botnet Detection by Classification Techniques
title_fullStr Android Botnet Detection by Classification Techniques
title_full_unstemmed Android Botnet Detection by Classification Techniques
title_sort Android Botnet Detection by Classification Techniques
publishDate 2020
container_title Advances in Intelligent Systems and Computing
container_volume 978 AISC
container_issue
doi_str_mv 10.1007/978-3-030-36056-6_11
url https://www.scopus.com/inward/record.uri?eid=2-s2.0-85078476738&doi=10.1007%2f978-3-030-36056-6_11&partnerID=40&md5=71d576ee9cbc753789a25376b017324d
description Currently, android botnet attacks have shifted from computers to smartphones due to its functionality, ease to exploit, and based on financial intention. Mostly, the Android malware attack increased due to its popularity and high usage among end users. Android botnet is defined as a collection of compromised mobile smartphones and controlled by a botmaster through a command and control (C&C) channel to serve a malicious purpose. Current research are still lacking in terms of their low detection rate due to their selected features. This approach is implemented by extracting two different types of features permissions, software features as well as API calls. Thus, this paper proposes an approach that utilizes ensemble learning for Android malware detection. It combines advantages of static analysis with the efficiency and performance of ensemble machine learning to improve Android malware detection accuracy. For dataset was collected from UNB the Canadian Institute for Cybersecurity dataset and benign from google play. Canadian Institute for Cybersecurity is actually a lightweight method for detection of Android botnet that infers detection patterns automatically and enables identifying botnet directly on the smartphone. The machine learning algorithms used are random forest and naive bayes for classification however while random forest show more accuracy compared with another algorithm. The performance of various classifiers is evaluated by identifying the rate of False Positive and True Positive and accuracy. The results showed that Random Forest Algorithm achieved the highest accuracy rate of 97.1%. In future, more significant approach by using different feature selection such as intent, string and system component will be further explored for a better detection and accuracy rate. © Springer Nature Switzerland AG 2020.
publisher Springer
issn 21945357
language English
format Conference paper
accesstype
record_format scopus
collection Scopus
_version_ 1812871799973609472