A Non-Intrusive Machine Learning Solution for Malware Detection and Data
Theft Classification in Smartphones
- URL: http://arxiv.org/abs/2102.06511v1
- Date: Fri, 12 Feb 2021 13:31:27 GMT
- Title: A Non-Intrusive Machine Learning Solution for Malware Detection and Data
Theft Classification in Smartphones
- Authors: Sai Vishwanath Venkatesh, Prasanna D. Kumaran, Joish J Bosco, Pravin
R. Kumaar, Vineeth Vijayaraghavan
- Abstract summary: Successful mobile malware attacks could steal a user's location, photos, or even banking information.
There is a need besides just detecting malware intrusion in smartphones to also identify the data that has been stolen to assess, aid in recovery and prevent future attacks.
We propose an accessible, non-intrusive machine learning solution to not only detect malware intrusion but also identify the type of data stolen for any app under supervision.
- Score: 0.06999740786886537
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Smartphones contain information that is more sensitive and personal than
those found on computers and laptops. With an increase in the versatility of
smartphone functionality, more data has become vulnerable and exposed to
attackers. Successful mobile malware attacks could steal a user's location,
photos, or even banking information. Due to a lack of post-attack strategies
firms also risk going out of business due to data theft. Thus, there is a need
besides just detecting malware intrusion in smartphones but to also identify
the data that has been stolen to assess, aid in recovery and prevent future
attacks. In this paper, we propose an accessible, non-intrusive machine
learning solution to not only detect malware intrusion but also identify the
type of data stolen for any app under supervision. We do this with Android
usage data obtained by utilising publicly available data collection framework-
SherLock. We test the performance of our architecture for multiple users on
real-world data collected using the same framework. Our architecture exhibits
less than 9% inaccuracy in detecting malware and can classify with 83%
certainty on the type of data that is being stolen.
Related papers
- MASKDROID: Robust Android Malware Detection with Masked Graph Representations [56.09270390096083]
We propose MASKDROID, a powerful detector with a strong discriminative ability to identify malware.
We introduce a masking mechanism into the Graph Neural Network based framework, forcing MASKDROID to recover the whole input graph.
This strategy enables the model to understand the malicious semantics and learn more stable representations, enhancing its robustness against adversarial attacks.
arXiv Detail & Related papers (2024-09-29T07:22:47Z) - Obfuscated Memory Malware Detection [2.0618817976970103]
We show how Artificial Intelligence and Machine learning can be used to detect and mitigate these cyber-attacks induced by malware in specific obfuscated malware.
We propose a multi-class classification model to detect the three types of obfuscated malware with an accuracy of 89.07% using the Classic Random Forest algorithm.
arXiv Detail & Related papers (2024-08-23T06:39:15Z) - FedDefender: Client-Side Attack-Tolerant Federated Learning [60.576073964874]
Federated learning enables learning from decentralized data sources without compromising privacy.
It is vulnerable to model poisoning attacks, where malicious clients interfere with the training process.
We propose a new defense mechanism that focuses on the client-side, called FedDefender, to help benign clients train robust local models.
arXiv Detail & Related papers (2023-07-18T08:00:41Z) - Harnessing the Power of Decision Trees to Detect IoT Malware [0.0]
Internet of Things (IoT) is susceptible to malware attacks.
Current methods and analysis,using static methods, are ineffective.
In this paper, we propose a novel detection and analysis method that harnesses the power of decision trees.
arXiv Detail & Related papers (2023-01-28T00:56:10Z) - Autoregressive Perturbations for Data Poisoning [54.205200221427994]
Data scraping from social media has led to growing concerns regarding unauthorized use of data.
Data poisoning attacks have been proposed as a bulwark against scraping.
We introduce autoregressive (AR) poisoning, a method that can generate poisoned data without access to the broader dataset.
arXiv Detail & Related papers (2022-06-08T06:24:51Z) - A Survey of Machine Learning Algorithms for Detecting Malware in IoT
Firmware [0.0]
This paper employs a number of machine learning algorithms to classify IoT firmware and the best performing models are reported.
Deep learning approaches including Convolutional and Fully Connected Neural Networks are also explored.
arXiv Detail & Related papers (2021-11-03T17:55:51Z) - Identification of Significant Permissions for Efficient Android Malware
Detection [2.179313476241343]
One out of every five business/industry mobile application leaks sensitive personal data.
Traditional signature/heuristic-based malware detection systems are unable to cope up with current malware challenges.
We propose an efficient Android malware detection system using machine learning and deep neural network.
arXiv Detail & Related papers (2021-02-28T22:07:08Z) - Being Single Has Benefits. Instance Poisoning to Deceive Malware
Classifiers [47.828297621738265]
We show how an attacker can launch a sophisticated and efficient poisoning attack targeting the dataset used to train a malware classifier.
As opposed to other poisoning attacks in the malware detection domain, our attack does not focus on malware families but rather on specific malware instances that contain an implanted trigger.
We propose a comprehensive detection approach that could serve as a future sophisticated defense against this newly discovered severe threat.
arXiv Detail & Related papers (2020-10-30T15:27:44Z) - Mind the GAP: Security & Privacy Risks of Contact Tracing Apps [75.7995398006171]
Google and Apple have jointly provided an API for exposure notification in order to implement decentralized contract tracing apps using Bluetooth Low Energy.
We demonstrate that in real-world scenarios the GAP design is vulnerable to (i) profiling and possibly de-anonymizing persons, and (ii) relay-based wormhole attacks that basically can generate fake contacts.
arXiv Detail & Related papers (2020-06-10T16:05:05Z) - Decentralized Privacy-Preserving Proximity Tracing [50.27258414960402]
DP3T provides a technological foundation to help slow the spread of SARS-CoV-2.
System aims to minimise privacy and security risks for individuals and communities.
arXiv Detail & Related papers (2020-05-25T12:32:02Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.