Future Generation Computer Systems
Future Generation Computer Systems
Future Generation Computer Systems
article info a b s t r a c t
Article history: Android smartphones are being utilized by a vast majority of users for everyday planning, data
Received 20 April 2020 exchanges, correspondences, social interaction, business execution, bank transactions, and almost
Received in revised form 28 September 2020 in each walk of everyday lives. With the expansion of human reliance on smartphone technology,
Accepted 11 October 2020
cyberattacks against these devices have surged exponentially. Smartphone applications use permissions
Available online 19 October 2020
to utilize various functionalities of the smartphone that can be maneuvered to launch an attack or
Keywords: inject malware by hackers. Existing studies present various approaches to detect Android malware
Android malware but lack early detection and identification. Accordingly, there is a dire need to craft an efficient
Malware family mechanism for malicious applications’ detection before they exploit the data. In this paper, a novel
Malware category approach DeepAMD to defend against real-world Android malware using deep Artificial Neural Network
API calls
(ANN) has been adopted including an efficiency comparison of DeepAMD with conventional machine
Deep learning
learning classifiers and state-of-the-art studies based on performance measures such as accuracy, recall,
Machine learning
Cyberattack f-score, and precision. As per the experimental analysis, DeepAMD outperforms other approaches in
Security detecting and identifying malware attacks on both Static as well as Dynamic layers. On the Static layer,
DeepAMD achieves the highest accuracy of 93.4% for malware classification, 92.5% for malware category
classification, and 90% for malware family classification. On the Dynamic layer, DeepAMD achieves the
highest accuracy of 80.3% for malware category classification and 59% for malware family classification
in comparison with the state-of-the-art techniques.
© 2020 Elsevier B.V. All rights reserved.
https://doi.org/10.1016/j.future.2020.10.008
0167-739X/© 2020 Elsevier B.V. All rights reserved.
S.I. Imtiaz, S.u. Rehman, A.R. Javed et al. Future Generation Computer Systems 115 (2021) 844–856
utilized API sequences, dependency graphs, and bundles. Then, Several studies provided an overview of the evolution of dif-
the DroidSIFT [37] malware classifier dependent on the weighted ferent malware detection and identification techniques [18–21].
relevant API dependency graph. DroidSIFT put a security-related Some studies used deep learning to check if malware exists
weighted API graph in a database for each application separately. in the smartphone application [24,25], but had certain limita-
It was observed that by an efficient graph search in database tions (i.e., low malware detection and identification rate, Dynamic
grouped applications based on the android packages and each analysis, family and category detection, and identification of mal-
group keeps an index of present critical API. An application was ware). These limitations arise through time and they have to
tested and its critical graph was generated. From this graph, a be updated for the safety of android phone security. This pa-
feature set was extracted in which if the vector is not zero then per focuses on addressing all these limitations by providing a
it shows the similarity score, and the test applications graph was highly efficient approach for the detection and identification of
compared with the database graph. These results were used for new types of malware. Table 1 shows existing works and the
anomaly detection and signature detection and had an accuracy limitations that we addressed in this research.
of 93% on Genome [38] dataset.
3. Dataset and preliminaries
2.2. Intent based android malware detection
We have used recently published Android Malware Dataset
Droidmat [36] introduced a malware analyzer that used Static (CICInvesAndMal2019) [46]. It is the second part of the dataset
permissions, intents, and API calls to classify android applications. CICAndMal2017 [29], in which benign and malware Android ap-
They utilized K-means to improve their malware ability and plications are tested on real smart devices. This dataset contains
utilized k-Nearest Neighbor to check if applications are malicious several families of Android malware, permissions, and intents as
or benign. Similarly, in [27], malware detection and classification Static features, API calls and all generated log files as Dynamic
model was proposed and used real-world datasets i.e. CICAnd- features. The dataset also includes captured features like process
logs, packages, log states, battery states, etc. Table 2 shows a
Mal2017. This model is used for the feature extraction phase and
detailed overview of the datasets adopted from [22] that are
to extract conversion-level features with the PeerShark tool. This
locally available with published year information. We provide a
model utilized conversation level traffic features of the network.
comparison of our dataset with the features of other publicly
In [39], a model of mobile malware detection that uses traffic
available datasets in Table 3. Malware samples in this dataset are
features to check the efficiency of traffic classifier and uses clas-
classified into four categories: (1) Adware, (2) Ransomware, (3)
sification techniques for are time-based, flow-based, and packet-
Scareware, and (4) SMS Malware.
based features to check malware families. For feature extraction
of the vector, CICFlowMeter [40] was used as the flow generator
3.1. Adware
and had extracted network traffic flow-level features. In [41], au-
thors proposed that intents are effective for identifying malicious
Adware is a type of malicious application affecting user pri-
applications because intents can encode malware when they are
vacy and security. Adware may cause the client damage by tak-
compared with the permissions feature set. Later, it was found
ing his information and sending it to a remote server, showing
through experimentation that the detection rate with permis-
advertisements forcefully through screen seizing or showing ad-
sions was 83% and with intents, it was 91%, when intent features
vertisements in the notification bar. which is typically held for
were combined with other features. However, the detection rate
significant framework occasions. In some cases, an Adware may
was up to 96% with a merge of intents and permissions.
hack the smartphone speaker [12]. The main purpose of Adware
is to make the user view or click the maximum unintentional
2.3. Permission based android malware detection commercials, banners, and posts [47]. Adware is any product
bundle that frequently presents ads to clients’ history of their
In a permission-based approach, the permission list is checked application usage or search history. This includes gathering data,
to confirm the existence of malicious apps. Authors in [42] distin- frequently and yet sometimes, using this data for malicious in-
guish between benign and malware appreciation using machine tentions [48]. Adware can be utilized deliberately by an adver-
learning and monitored permissions and event features. Aung tisement company, other meddling adware may likewise misuse
et al. [42] made a malware detection monitor that can recognize an advertisement company and subvert income and data from
malware and benign application. They utilized K-means, random the proprietors of the promotion company. Aggressive adware
forest, and decision trees to group the malware by selected fea- can make alternate routes on to the home screen, take book-
ture set. Experiments on two distinctive datasets revealed a 90% marks, change default internet browser, search engine, internet
average detection rate. Likewise, another author Huang et al. [43] settings, and pushing pointless notices Plankton is one such kind
guaranteed that a permission-based approach can be utilized as a of aggressive adware. Adware can be designed to take control
fast channel that has a detection rate of above 81% on malicious of the user’s android device when it is merged with botnet and
samples. repacks itself as a popular application [39]. Aggressive Adware
The evaluation confirmed that network traffic flow-level fea- can exploit vulnerabilities and attack installed from third-party
tures are helpful for binary detection in the above-mentioned sources [49,50].
scenarios. In [44], the malicious samples were collected from
CICAndMal2017 with the alignment of permissions. The sequence 3.2. Ransomware
alignment principle was used to check similarity based on per-
missions for normal families and malicious families. The classifi- Ransomware is a sort of malware that requests a cash amount
cation threshold is obtained from the similarity score between the from the tainted client. On Android, there are two general classes
DNA of the families and the tested application. In [45], the results of ransomware which are lock-screen and crypto. In lock-screen,
are evaluated and with those results DL-Droid which uses 31,125 class, the smartphone asset is hindered by a picture that com-
Android apps, and uses 420 Static and Dynamic features. The per- pletely covers the screen. Secondly, In the crypto class, the ran-
formance was compared with deep learning-based frameworks somware scrambles the client’s significant information. Android
and traditional machine learning classifiers. ransomware normally fits the general meaning of a trojan horse.
846
S.I. Imtiaz, S.u. Rehman, A.R. Javed et al. Future Generation Computer Systems 115 (2021) 844–856
Table 1
Summary of existing malware detection studies using deep learning and machine learning.
Year Ref. Method API calls Intents Permission Limitations
2012 [36] K-means Yes Yes Yes Limited to Static permission, intents and API calls
2014 [35] MLP Yes No Yes Limited features including permissions and API calls
2016 [24] DBN Yes No Yes Does not focus on intents and has low detection rate
2014 [25] DBN Yes No No Low detection rate
Table 2
Details regarding currently available android malware datasets [22]. Key: Symbolic — S, Continuous — C, SMO — Spider Monkey, PCA — Principal Component Analysis,
States — S, Permission — P, Intent — I, Components — C, Certification — Ce, Source Code — SC, API.Call — APC, Network — N.
Dataset name Pub. No. of No. of Captured static features Captured dynamic features Installed On
Year Benign Malware S P I C Ce SC APC N Sys.Call Infoflow Log
Genome [27] 2012 – 1260 ✕ ✓ ✕ ✓ ✕ ✓ ✕ ✕ ✕ ✕ ✕ –
Drebin [3] 2014 123,453 5560 ✕ ✓ ✓ ✓ ✕ ✓ ✕ ✕ ✕ ✕ ✕ –
AndroTracker [13] 2015 51,179 4554 ✕ ✓ ✓ ✕ ✓ ✓ ✕ ✕ ✕ ✕ ✕ –
SAPIMMDS [11] 2016 1776 906 ✕ ✕ ✕ ✕ ✕ ✕ ✓ ✕ ✕ ✕ ✕ Emulator
Andro-Dumpsys [24] 2016 1776 906 ✕ ✓ ✓ ✕ ✓ ✓ ✓ ✕ ✕ ✕ ✕ Emulator
Andro-Profiler [12] 2016 8840 643 ✕ ✕ ✕ ✕ ✕ ✕ ✕ ✕ ✓ ✕ ✓ Emulator
Kharon [6] 2016 – 7 ✕ ✕ ✕ ✕ ✕ ✕ ✕ ✕ ✕ ✓ ✕ RealPhone
AAGM [15] 2017 1500 400 ✕ ✕ ✕ ✕ ✕ ✕ ✕ ✓ ✕ ✕ ✕ RealPhone
AMD [23] 2017 – 405 ✕ ✕ ✕ ✓ ✕ ✓ ✕ ✕ ✕ ✕ ✕ –
MalDozer [14] 2018 38,000 33,000 ✕ ✕ ✕ ✕ ✕ ✓ ✕ ✕ ✕ ✕ ✕ –
UCL [20] 2018 1,2M – ✕ ✕ ✕ ✓ ✕ ✓ ✕ ✕ ✕ ✕ ✕ –
CICAndMal2017 2018 1700 426 ✓ ✓ ✓ ✕ ✕ ✕ ✓ ✓ ✕ ✕ ✕ RealPhone
CICInvesAndMal2019 2019 5,065 426 ✓ ✓ ✓ ✕ ✕ ✕ ✓ ✓ ✕ ✕ ✕ RealPhone
Table 3
Comparison of publicly available android malware datasets [22].
Year Dataset A1 A2 A3 A4 A5 A6 A7 A8 A9 A10 A11 CA12 A13 A14 A15
2012 Genome [27] S – – ✓ – – ✓ ✓ – ✓ ✓ ✕ ✓ ✓ ✕
2014 Drebin [3] S – – ✓ – – ✓ ✓ ✕ ✓ ✓ ✓ ✓ ✕ ✕
2015 AndroTracker [13] S – – ✓ – – ✕ ✓ ✕ ✓ ✓ ✓ ✓ ✕ ✕
2016 SAPIMMDS [11] B ✕ ✓ ✓ ✕ ✕ ✓ ✓ ✓ ✓ ✕ ✕ ✓ ✕ ✕
2016 Andro-Dumpsys [24] B ✕ ✓ ✓ ✕ ✕ ✓ ✓ ✓ ✓ ✕ ✓ ✓ ✕ ✕
2016 Andro-Profiler [12] B ✕ ✓ ✓ ✕ ✕ ✓ ✕ ✓ ✓ ✓ ✕ ✓ ✕ ✕
2016 Kharon [6] B ✓ ✕ ✓ ✓ ✕ ✓ ✕ – ✓ ✕ ✕ ✓ ✕ ✓
2017 AAGM [15] D ✓ ✓ ✓ ✓ ✕ ✓ ✕ ✓ ✓ ✓ ✕ ✓ ✕ ✓
2017 AMD [23] S – – ✓ – – ✓ ✓ – ✓ ✓ ✓ ✓ ✓ ✓
2018 MalDozer [14] S ✕ ✕ ✓ ✕ ✕ ✓ ✓ ✓ ✕ ✓ ✕ ✓ ✕ ✓
2018 UCL [20] S ✕ ✕ ✓ ✕ ✕ ✓ ✓ ✕ ✕ ✓ ✕ ✕ ✕ ✓
2017 CICAndMal2017 B ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✕
2019 InvesCICAndMal2019 B ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓
Legend:
A1: Type of data capturing, Static(S) or Dynamic(D) or both(B).
A2: Utilizing Real-Phone devices instead of emulators.
A3: Having network architecture for the experiment set up.
A4: Examining real-world malware samples.
A5: Having malware activation scenario.
A6: Defining multiple states of data capturing.
A7: Having trust-able fully-labeled malware samples.
A8: Including diverse malware categories and families.
A9: Keeping balance between malicious and benign samples.
A10: Avoiding anonymity and preserving all captured data.
A11: Containing a heterogeneous set of resources.
A12: Providing a variety of feature sets for other researchers.
A13: For meta-data, includes a proper documentation.
A14: Including malware taxonomy.
A15: Being up-to-date.
At times, the vindictive APKs duplicate just the name and symbol 3.3. Scareware
of the typical application or mask it as an authentic document in
an SMS or email. Social engineering is to control exploited people Scareware is the type of malware that aims to scare the end-
from introducing malicious APKs and executing functions [13]. user paying for useless applications [54]. Scareware is made to
Ransomware is a file that can encrypt the files and lock the scare or to trap users with some phishing website to steal their
device, then demand payment from the end-users for decryption information [55]. Scareware trick the user by presenting scam
of files or to unlock the device [51]. When the files are encrypted as legitimate applications that typically take on the appearance
once, these cannot be recovered with the decryption key even if of security applications for example, ‘‘against malware program-
the ransomware is removed from the system [52]. Ransomware ming" or more explicitly ‘‘hostile to infection programming".
works with permissions and intents on the android system [21]. Scareware is particularly made to incorporate phony filtering
Ransomware can also use identity or label for an authentic crime exchanges, fake advancement bars, and phony alarms. Scareware
investigation organization (USA Crime investigation or FBI) and may show counterfeit arrangements of virus records That are so
make fake claims to mislead target users [53]. produced incorporate documents that may not exist on the PC or
847
S.I. Imtiaz, S.u. Rehman, A.R. Javed et al. Future Generation Computer Systems 115 (2021) 844–856
Fig. 1. Graphical representation of proposed android malware application detection and identification approach.
Table 5 Table 6
Details of the optimal hyper-parameters deep artificial neural network. Computing environment.
Parameter Value Parameter Value
Initial Bias 0 Operating System Windows 10 Professional 1909
Internal layer 3 CPU Intel(R) Core(TM)i7-6700HQ
Dropout Dynamic RAM 16 GB
Activation function at all layers Relu GPU NVIDIA GeForce 1060
Activation function at output layer Sigmoid CUDA Version 9.0
Batch size Dynamic Python Version 3.8
Learning optimizer Adam
Error function Binary & Categorical Cross Entropy
Fig. 2. Model accuracy and loss of binary classification on Static layer using train and validation datasets.
Table 7
Binary malware classification performance on static layer.
Accuracy (%) F-score (%) Recall (%) Precision (%)
J48 0.905 0.906 0.905 0.906
NB 0.620 0.634 0.620 0.809
SMO 0.918 0.913 0.918 0.926
MLP 0.905 0.906 0.905 0.906
DeepAMD 0.934 0.932 0.934 0.935
Fig. 4. Model accuracy and loss of category classification using train and validation datasets on Static layer.
Table 10
Malware category classification performance on dynamic layer.
Accuracy (%) F-score (%) Recall (%) Precision (%)
J48 0.712 0.713 0.712 0.720
NB 0.727 0.723 0.727 0.731
SMO 0.681 0.701 0.681 0.781
MLP 0.575 0.538 0.575 0.512
DeepAMD 0.803 0.805 0.803 0.822
Fig. 6. Model accuracy and loss on train and validation datasets of family classification on Static layer.
Fig. 7. Model accuracy and loss of category classification using train and validation datasets on Dynamic layer.
6. Comparative analysis
In Tables 12, 13, 14, precision and recall are compared with
2 different versions of a dataset. Case A represents the dataset
CICAndMal2017 [29]. Case B represents the second version of
CICAndMal2017 [46]. The research was conducted by author [22],
Fig. 8. Confusion matrix of category classification on Dynamic layer. in which they used random forest algorithm to calculate the
precision and recall of dataset. Our approach DeepAMD achieves
Table 11 the highest accuracy using the DeepAMD algorithm. As compared
Malware family classification performance of DeepAMD on dynamic layer. to other studies [22,27,32], we improve our results in both the
Accuracy (%) F-score (%) Recall (%) Precision (%) Static and Dynamic layers with our analysis. We achieve the
J48 0.442 0.479 0.442 0.603 highest precision 93.5% as shown in Table 12 for malware binary
NB 0.590 0.581 0.590 0.650 classification, slightly low accuracy from state-of-the-art for mal-
SMO 0.262 0.259 0.262 0.334 ware category classification, and best accuracy of 65.1% using our
MLP 0.049 0.040 0.049 0.076
DeepAMD 0.557 0.540 0.55 0.591
approach as shown in Table 14. on the Static layer, we improve
the performance of binary classification of binary malware by
3.0% and on the Dynamic layer, we improve the performance of
classification of malware family by 6.1% within comparison with
0.590% at the 44th epoch. Training accuracy starts at 0.05% and state-of-the-art.
goes up to 0.9%. Then the convergence of training accuracy In Table 12, DeepAMD achieve the highest precision of 98.3%
becomes stable. Test accuracy starts at 0.1% and goes up to using SMO for Static layer malware binary classification. Other
852
S.I. Imtiaz, S.u. Rehman, A.R. Javed et al. Future Generation Computer Systems 115 (2021) 844–856
Fig. 9. Model accuracy and loss of family classification using train and validation datasets on Dynamic layer.
of a Dynamic layer, the highest f-score of malware category is [6] K. Sharma, B. Gupta, Towards privacy risk analysis in android applications
80.5% achieved by DeepAMD and for the highest f-score of mal- using machine learning approaches, Int. J. E-Serv. Mob. Appl. (IJESMA) 11
(2) (2019) 1–21.
ware family classification is 58.1% achieved by the Naive Bayes
[7] A.R. Javed, M.U. Sarwar, S. Khan, C. Iwendi, M. Mittal, N. Kumar, Analyzing
algorithm. the effectiveness and contribution of each axis of tri-axial accelerometer
sensor for accurate activity recognition, Sensors 20 (8) (2020) 2216.
8. Conclusion [8] C. Wang, Q. Xu, X. Lin, S. Liu, Research on data mining of permissions
mode for android malware detection, Cluster Comput. 22 (6) (2019)
13337–13350.
The evolution of the Internet of Things (IoT) and smart devices
[9] A.R. Javed, M.O. Beg, M. Asim, T. Baker, A.H. Al-Bayatti, Alphalogger:
has brought a new range of challenges to device vendors, soft- detecting motion-based side-channel attack using smartphone keystrokes,
ware developers as well as cybersecurity professionals. Previously J. Ambient Intell. Humaniz. Comput. (2020) 1–14.
unobserved Android malware is being identified and new mal- [10] M. Mittal, C. Iwendi, S. Khan, A. Rehman Javed, Analysis of security and
ware is evolving. To counter malware in Android devices, in this energy efficiency for shortest route discovery in low-energy adaptive
clustering hierarchy protocol using levenberg-marquardt neural network
paper, a novel DeepAMD approach is proposed. DeepAMD achieved
and gated recurrent unit for intrusion detection system, Trans. Emerg.
the highest accuracy of 93.4% on the Static layer to classify binary Telecommun. Technol. (2020) e3997.
malware and then categorize malware using DeepAMD. DeepAMD [11] N.T. Cam, V.-H. Pham, T. Nguyen, Detecting sensitive data leakage via inter-
achieved an accuracy of 93.1% on the Static layer to classify applications on android using a hybrid analysis technique, Cluster Comput.
malware families using the DeepAMD. Secondly, on the Dynamic 22 (1) (2019) 1055–1064.
[12] I. Ideses, A. Neuberger, Adware detection and privacy control in mobile
layer, we achieved the highest accuracy of 80.3% for malware devices, in: 2014 IEEE 28th Convention of Electrical & Electronics Engineers
category classification. We achieved an accuracy of 59.0% for in Israel (IEEEI), IEEE, 2014, pp. 1–5.
malware family classification on the Dynamic layer. The DeepAMD [13] J.-S. Ko, J.-S. Jo, D.-H. Kim, S.-K. Choi, J. Kwak, Real time android
is evaluated using the state-of-the-art CICAndMal2019 dataset ransomware detection by analyzed android applications, in: 2019 Interna-
and experimental results demonstrated that DeepAMD is the most tional Conference on Electronics, Information, and Communication (ICEIC),
IEEE, 2019, pp. 1–5.
efficient method for detecting and identifying Android malware [14] M. Sikorski, A. Honig, Practical Malware Analysis: The Hands-On Guide to
on the Static as well as Dynamic layer. In the future, we intend to Dissecting Malicious Software, no starch press, 2012.
make an online service through which the user would be able to [15] F. Faghihi, M. Abadi, A. Tajoddin, Smsbothunter: A novel anomaly detection
see if an application is benign or malicious before downloading technique to detect sms botnets, in: 2018 15th International ISC (Iranian
Society of Cryptology) Conference on Information Security and Cryptology
it. This step would contribute positively to ensure the security of
(ISCISC), IEEE, 2018, pp. 1–6.
an android smartphone device. [16] A. Arora, S. Garg, S.K. Peddoju, Malware detection using network traffic
analysis in android based mobile devices, in: 2014 Eighth International
CRediT authorship contribution statement Conference on Next Generation Mobile Apps, Services and Technologies,
IEEE, 2014, pp. 66–71.
[17] C. Iwendi, Z. Jalil, A.R. Javed, T. Reddy, R. Kaluri, G. Srivastava, O. Jo,
Syed Ibrahim Imtiaz: Acquisition of data, Writing - original
Keysplitwatermark: Zero watermarking algorithm for software protection
draft. Saif ur Rehman: Acquisition of data, Analysis and/or inter- against cyber-attacks, IEEE Access 8 (2020) 72650–72660.
pretation of data, Writing - original draft. Abdul Rehman Javed: [18] M. Shafiq, Z. Tian, A.K. Bashir, X. Du, M. Guizani, Iot malicious traffic
Conception and design of study, Acquisition of data, Writing identification using wrapper-based feature selection mechanisms, Comput.
- original draft. Zunera Jalil: Conception and design of study, Secur. (2020) 101863.
[19] J. Yu, T. Yamauchi, Access control to prevent attacks exploiting vul-
Analysis and/or interpretation of data, Writing - original draft,
nerabilities of webview in android os, in: 2013 IEEE 10th International
Writing - review & editing. Xuan Liu: Writing - review & editing. Conference on High Performance Computing and Communications & 2013
Waleed S. Alnumay: Writing - review & editing. IEEE International Conference on Embedded and Ubiquitous Computing,
IEEE, 2013, pp. 1628–1633.
Declaration of competing interest [20] Y. Nishimoto, N. Kajiwara, S. Matsumoto, Y. Hori, K. Sakurai, Detection
of android api call using logging mechanism within android framework,
in: International Conference on Security and Privacy in Communication
The authors declare that they have no known competing finan- Systems, Springer, 2013, pp. 393–404.
cial interests or personal relationships that could have appeared [21] S. Song, B. Kim, S. Lee, The effective ransomware prevention technique
to influence the work reported in this paper. using process monitoring on android platform, Mob. Inf. Syst. 2016 (2016).
[22] L. Taheri, A.F.A. Kadir, A.H. Lashkari, Extensible android malware detection
and family classification using network-flows and api-calls, in: 2019
Acknowledgment
International Carnahan Conference on Security Technology (ICCST), IEEE,
2019, pp. 1–8.
This research is supported by Researchers Supporting Project [23] F. Tchakounté, A.D. Wandala, Y. Tiguiane, Detection of android malware
number (RSP-2020/250), King Saud University, Riyadh, Saudi Ara- based on sequence alignment of permissions, Int. J. Comput. (IJC) 35 (1)
bia. All authors approved the version of the manuscript to be (2019) 26–36.
[24] Z. Yuan, Y. Lu, Y. Xue, Droiddetector: android malware characterization
published. and detection using deep learning, Tsinghua Sci. Technol. 21 (1) (2016)
114–123.
References [25] Z. Yuan, Y. Lu, Z. Wang, Y. Xue, Droid-sec: deep learning in android
malware detection, in: Proceedings of the 2014 ACM Conference on
[1] Gartner says worldwide sales of smartphones recorded first ever decline SIGCOMM, 2014, pp. 371–372.
during the fourth quarter of 2017, 2020, https://www.gartner.com/en/ [26] Number of smartphone users worldwide from 2016 to 2021, 2020,
newsroom/ (Accessed: 2020-03-12). https://www.statista.com/statistics/330695/number-of-smartphone-users-
[2] G. Raja, A. Ganapathisubramaniyan, S. Anbalagan, S.B.M. Baskaran, K. Raja, worldwide/ (Accessed: 2020-04-3).
A.K. Bashir, Intelligent reward-based data offloading in next-generation [27] M.K.A. Abuthawabeh, K.W. Mahmoud, Android malware detection and
vehicular networks, IEEE Internet Things J. 7 (5) (2020) 3747–3758. categorization based on conversation-level network traffic features, in:
[3] A. Rehman Javed, Z. Jalil, S. Atif Moqurrab, S. Abbas, X. Liu, Ensemble 2019 International Arab Conference on Information Technology (ACIT),
adaboost classifier for accurate and fast detection of botnet attacks in IEEE, 2019, pp. 42–47.
connected vehicles, Trans. Emerg. Telecommun. Technol. (2020) e4088. [28] F. Noorbehbahani, F. Rasouli, M. Saberi, Analysis of machine learning
[4] E. Lavoie, L. Hendren, Personal volunteer computing, in: Proceedings of techniques for ransomware detection, in: 2019 16th International ISC
the 16th ACM International Conference on Computing Frontiers, 2019, pp. (Iranian Society of Cryptology) Conference on Information Security and
240–246. Cryptology (ISCISC), IEEE, 2019, pp. 128–133.
[5] The mobile economy 2020, 2020, https://www.gsma.com/mobileeconomy/ [29] Android malware dataset (cicandmal2017 - first part), 2020, https://www.
(Accessed: 2020-03-12). unb.ca/cic/datasets/andmal2017.html (Accessed: 2020-03-12).
854
S.I. Imtiaz, S.u. Rehman, A.R. Javed et al. Future Generation Computer Systems 115 (2021) 844–856
[30] R. Chen, Y. Li, W. Fang, Android malware identification based on traffic [56] K. Hamandi, A. Chehab, I.H. Elhajj, A. Kayssi, Android sms malware:
analysis, in: International Conference on Artificial Intelligence and Security, Vulnerability and mitigation, in: 2013 27th International Conference on
Springer, 2019, pp. 293–303. Advanced Information Networking and Applications Workshops, IEEE,
[31] Intrusion detection evaluation dataset (cicids2017), 2020, https://www. 2013, pp. 1004–1009.
unb.ca/cic/datasets/ids-2017.html (Accessed: 2020-03-12). [57] SMS attacks and mobile malware threats, 2020, https://www.kaspersky.
[32] I. Sharafaldin, A.H. Lashkari, A.A. Ghorbani, Toward generating a new com/resource-center/threats/sms-attacks (Accessed: 2020-03-12).
[58] A.H. Lashkari, A.F.A. Kadir, L. Taheri, A.A. Ghorbani, Toward developing
intrusion detection dataset and intrusion traffic characterization, in: ICISSP,
a systematic approach to generate benchmark android malware datasets
2018, pp. 108–116.
and classification, in: 2018 International Carnahan Conference on Security
[33] M. Samara, E.-S.M. El-Alfy, Benchmarking open-source android mal-
Technology (ICCST), IEEE, 2018, pp. 1–7.
ware detection tools, in: 2019 2nd IEEE Middle East and North Africa
[59] M. Usman Sarwar, A. Rehman Javed, F. Kulsoom, S. Khan, U. Tariq,
COMMunications Conference (MENACOMM), IEEE, 2019, pp. 1–6.
A. Kashif Bashir, Parciv: Recognizing physical activities having complex
[34] D. Maiorca, F. Mercaldo, G. Giacinto, C.A. Visaggio, F. Martinelli, R- interclass variations using semantic data of smartphone, Softw. - Pract.
PackDroid: API package-based characterization and detection of mobile Exp. (2020).
ransomware, in: Proceedings of the Symposium on Applied Computing,
2017, pp. 1718–1723.
[35] P.P. Chan, W.-K. Song, Static detection of android malware by using
Syed Ibrahim Imtiaz is a MS scholar at National
permissions and api calls, in: 2014 International Conference on Machine
Center for CyberSecurity , Air University, Islamabad,
Learning and Cybernetics, Vol. 1, IEEE, 2014, pp. 82–87.
Pakistan. He is currently pursuing his degree in Masters
[36] D.-J. Wu, C.-H. Mao, T.-E. Wei, H.-M. Lee, K.-P. Wu, Droidmat: Android from Air University, Islamabad, Pakistan. His current
malware detection through manifest and api calls tracing, in: 2012 Seventh research interests include but are not limited to
Asia Joint Conference on Information Security, IEEE, 2012, pp. 62–69. cybersecurity, artificial intelligence, computer vision,
[37] M. Zhang, Y. Duan, H. Yin, Z. Zhao, Semantics-aware android mal- network security, IoT, smart city, and application de-
ware classification using weighted contextual api dependency graphs, velopment for smart living. He aims to contribute
in: Proceedings of the 2014 ACM SIGSAC Conference on Computer and to interdisciplinary research of computer science and
Communications Security, 2014, pp. 1105–1116. human-related disciplines.
[38] Y. Zhou, X. Jiang, Dissecting android malware: Characterization and evo-
lution, in: 2012 IEEE Symposium on Security and Privacy, IEEE, 2012, pp.
95–109.
[39] A.H. Lashkari, A.F.A. Kadir, H. Gonzalez, K.F. Mbah, A.A. Ghorbani, Towards Saif ur Rehman is a student at the Faculty of Comput-
a network-based framework for android malware detection and character- ing and AI, Air University, Islamabad, Pakistan. He is
ization, in: 2017 15th Annual Conference on Privacy, Security and Trust currently pursuing his degree in Bachelor of Science
(PST), IEEE, 2017, pp. 233–23309. in Computer Science from Air University, Islamabad,
[40] G. Draper-Gil, A.H. Lashkari, M.S.I. Mamun, A.A. Ghorbani, Characterization Pakistan. His current research interests include but
of encrypted and vpn traffic using time-related, in: Proceedings of the are not limited to cybersecurity, artificial intelligence,
2nd International Conference on Information Systems Security and Privacy computer vision, network security, IoT, smart city, and
(ICISSP), 2016, pp. 407–414. application development for smart living. He aims to
[41] A. Feizollah, N.B. Anuar, R. Salleh, G. Suarez-Tangil, S. Furnell, Androdialy- contribute to interdisciplinary research of computer
sis: Analysis of android intent effectiveness in malware detection, Comput. science and human-related disciplines.
Secur. 65 (2017) 121–134.
[42] W.Z. Zarni Aung, Permission-based android malware detection, Int. J. Sci.
Technol. Res. 2 (3) (2013) 228–234.
Abdul Rehman Javed is a lecturer at the Department
[43] C.-Y. Huang, Y.-T. Tsai, C.-H. Hsu, Performance evaluation on permission-
of CyberSecurity, Air University, Islamabad, Pakistan.
based detection for android malware, in: Advances in Intelligent Systems
He worked with National Cybercrimes and Forensics
and Applications-Volume 2, Springer, 2013, pp. 111–120.
Laboratory, Air University, Islamabad, Pakistan. He re-
[44] G. Canfora, E. Medvet, F. Mercaldo, C.A. Visaggio, Detecting android ceived his Master’s degree in Computer Science from
malware using sequences of system calls, in: Proceedings of the 3rd National University of Computer and Emerging Sci-
International Workshop on Software Development Lifecycle for Mobile, ences, Islamabad, Pakistan. He is a reviewer of many
2015, pp. 13–20. well-known journals, including, Sustainable cities and
[45] M.K. Alzaylaee, S.Y. Yerima, S. Sezer, Emulator vs real phone: Android society (Elsevier), Journal of Information Security and
malware detection using machine learning, in: Proceedings of the 3rd ACM Applications (Elsevier) and IEEE Access. His current
on International Workshop on Security and Privacy Analytics, 2017, pp. research interests include but are not limited to mobile
65–72. and ubiquitous computing, data analysis, knowledge discovery, data mining,
[46] Investigation of the android malware (cicinvesandmal2019), 2020, https: natural language processing, smart homes, and their applications in human
//www.unb.ca/cic/datasets/invesandmal2019.html (Accessed: 2020-03-12). activity analysis, human motion analysis and e-health. He aims to contribute
[47] M.T. Ahvanooey, Q. Li, M. Rabbani, A.R. Rajput, A survey on smart- to interdisciplinary research of computer science and human-related disciplines.
phones security: Software vulnerabilities, malware, and attacks, 2020, He has authored more than over 10 peer-reviewed articles on topics related to
arXiv preprint arXiv:2001.09406. cybersecurity, mobile computing and digital forensics.
[48] E. Erturk, A case study in open source software security and privacy:
Android adware, in: World Congress on Internet Security (WorldCIS-2012),
IEEE, 2012, pp. 189–191.
[49] Android malware genome project, 2020, http://www.malgenomeproject. Dr. Zunera Jalil received the B.Sc. degree from Pun-
org/ (Accessed: 2020-01-12). jab University, Lahore, Pakistan, in 1999, and then
Master2̆019s degree in computer science from Interna-
[50] W. Zhou, Y. Zhou, X. Jiang, P. Ning, Detecting repackaged smartphone
tional Islamic University, Islamabad, Pakistan. She later
applications in third-party android marketplaces, in: Proceedings of the
earned scholarship from Higher Education Commission
Second ACM Conference on Data and Application Security and Privacy,
of Pakistan to pursue M.S. degree in computer science
2012, pp. 317–326.
and then Ph.D. degree in computer science with infor-
[51] Q. Liao, Ransomware: a growing threat to smes, in: Conference Southwest
mation security specialization from the FAST-National
Decision Science Institutes, 2008.
University of Computer and Emerging Sciences, Islam-
[52] T. Micro, Ransomware Definition—Security Intelligence, TREND Micro,
abad, Pakistan, in 2007 and 2010, respectively. She
Irving, Tex, USA, 2015.
served at International Islamic University, Islamabad,
[53] P. Zavarsky, D. Lindskog, et al., Experimental analysis of ransomware on Iqra University, Islamabad and then Saudi Electronic University, Riyadh, Saudi
windows and android platforms: Evolution and characterization, Procedia Arabia. She is currently with the Department of CyberSecurity and is involved
Comput. Sci. 94 (2016) 465–472. with National Cybercrimes and Forensics Laboratory, Air University, Islamabad,
[54] S. Gupta, Types of malware and its analysis, Int. J. Sci. Eng. Res. 4 (1) Pakistan. Her current research interests include but are not limited to computer
(2013). forensics, intelligent systems, and data privacy protection.
[55] S. Omeleze, H.S. Venter, Testing the harmonised digital forensic investiga-
tion process model-using an android mobile phone, in: 2013 Information
Security for South Africa, IEEE, 2013, pp. 1–8.
855
S.I. Imtiaz, S.u. Rehman, A.R. Javed et al. Future Generation Computer Systems 115 (2021) 844–856
Xuan Liu graduated from Shandong University, China, IoT, IEEE CL, Elsevier, JNCA, Elsevier FGCS, Springer WINE, Springer TELS, IET
and received M.S. degree from Wuhan Polytechnic SMC, EAI CollaborateCom, and Wiley IJCS, etc. His research interests include
University, China and Ph.D. degree in computer sci- content network and governance, collaborate networking for smart cities, aerial
ence and engineering from Southeast University, China. communication systems, etc.
Since 2020, he joins Yangzhou University, China. He
is serving as an Advisory Editor of Wiley Engineering
Reports, an Associate Editor of Springer Telecommu- Waleed S. Alnumay received his bachelor degree in
nication Systems, IET Smart Cities, Taylor& Francis Computer Science from King Saud University, Riyadh,
International Journal of Computers and Applications Saudi Arabia in the year 1993. He did his master
and KeAi International Journal of Intelligent Networks, degree in Computer Science from University of Atlanta,
an Area Editor of EAI Endorsed Transactions on Internet Atlanta, Georgia, USA in the year 1996. He completed
of Things, the Lead Guest Editor of Elsevier Internet of Things, Wiley Transactions his Ph.D. in Computer Science from Oklahoma Uni-
on Emerging Telecommunications Technologies and Wiley Internet Technology versity, Norman, Oklahoma, USA in the year 2004.
Letters, and the Chair of CollaborateCom 2020 workshop. He serves/served as a Dr. Alnumay is currently working as an Associate
TPC Member of ACM MobiCom 2020 workshop, IEEE INFOCOM 2020 workshop, Professor of Mobile Networking in Computer Science
IEEE ICC 2020/2019, IEEEGlobeCom 2019, IEEE PIMRC 2020/2019, IEEE MSN Department, King Saud University. He has published
2020, IEEE VTC 2020/2019/2018, IEEE ICIN2020, IEEE GIIS 2020, IEEE DASC 2019, research papers in reputed international conferences
APNOMS 2020/2019, Ad Hoc-Now2020, FNC 2020/2019, EAI CollaborateCom and journals. His main research interest is Computer Networks and Distributed
2020/2019, and EAI ChinaCom 2019, etc. Furthermore, he has been reviewing Computing that includes but not limited to Mobile Ad hoc and Sensor Networks,
papers for 20+ reputable conferences/journals including IEEE INFOCOM, IEEE Information-Centric Networking and Software-Defined Networking.
ICC, IEEE GlobeCom, IEEE WCNC, IEEE PIMRC, IEEE COMMAG, IEEE TII, IEEE
856