{"title":"DroidTKM: Detection of Trojan Families using the KNN Classifier Based on Manhattan Distance Metric","authors":"Diyana Tehrany Dehkordy, A. Rasoolzadegan","doi":"10.1109/ICCKE50421.2020.9303720","DOIUrl":null,"url":null,"abstract":"Currently, the speed of Android malware publications has increased dramatically. The rapid rise of malware has made malware detection and family classification to become an important challenge; because attackers can publish more malware with minor changes in existing android applications. These minor changes in the application lead to the creation of multiple families of malware. So far, many methods have been proposed to detect malware applications and classify them. However, few methods focus on detecting malware families. In this paper, a detection method is proposed to identify Trojan families in order to improve accuracy and reduce error rates. To achieve these purposes, static and dynamic analysis are used to extract the required features of the applications. The k- means method has also been used to preprocess the obtained dataset. Then, a detection model is developed to identify families using the classifiers of K-Nearest Neighbor (KNN), Support Vector Machine, and Iterative Dichotomiser 3. The accuracy of KNN is also measured according to different distance metrics which has not yet been studied among malware detection methods. The proposed method is able to detect a variety of Trojans using KNN based on Manhattan metric with an accuracy of 97.83% and False Positive Rate (FPR) of 0.06%. The comparison between the performance of the proposed method and the other methods shows a 4.83% and 0.94% improvement in terms of accuracy and FPR, respectively.","PeriodicalId":402043,"journal":{"name":"2020 10th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 10th International Conference on Computer and Knowledge Engineering (ICCKE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCKE50421.2020.9303720","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
Currently, the speed of Android malware publications has increased dramatically. The rapid rise of malware has made malware detection and family classification to become an important challenge; because attackers can publish more malware with minor changes in existing android applications. These minor changes in the application lead to the creation of multiple families of malware. So far, many methods have been proposed to detect malware applications and classify them. However, few methods focus on detecting malware families. In this paper, a detection method is proposed to identify Trojan families in order to improve accuracy and reduce error rates. To achieve these purposes, static and dynamic analysis are used to extract the required features of the applications. The k- means method has also been used to preprocess the obtained dataset. Then, a detection model is developed to identify families using the classifiers of K-Nearest Neighbor (KNN), Support Vector Machine, and Iterative Dichotomiser 3. The accuracy of KNN is also measured according to different distance metrics which has not yet been studied among malware detection methods. The proposed method is able to detect a variety of Trojans using KNN based on Manhattan metric with an accuracy of 97.83% and False Positive Rate (FPR) of 0.06%. The comparison between the performance of the proposed method and the other methods shows a 4.83% and 0.94% improvement in terms of accuracy and FPR, respectively.