The monetary benefits associated with the Android operating system have attracted the cybercriminals to generate malware application. Malware creators tend to leak sensitive information to their servers for financial gains. They can turn mobile devices into bots to perform malicious actions. To speed the process of malware classification, Android malware can be converted into digital images using the visualization technique. The malicious content of the malware application is visualized as an image. In this paper, we have employed two different types of image descriptors namely Gray Level Co-occurrence Matrix-based (GLCM) and GIST for feature extraction. To evaluate the classification results, the extracted features are classified using the AdaBoost classifier. The classification performance is also evaluated using the fusion of GLCM and GIST image descriptors. The experiment results show that feature fusion enhances the classification performance than the standalone image descriptors. Using feature fusion and AdaBoost learning, the performance measures such as accuracy, precision, recall, and F1 score are achieved to be 92.75%, 90%, 95.32%, and 92.32% respectively.

1.
W.
Zhou
,
Y.
Zhou
,
X.
Jiang
, and
P.
Ning
, “
Detecting repackaged smartphone applications in third-party android marketplaces
,”
Proc. Second ACM Conf. Data Appl. Secur. Priv. - CODASKY ’12
, pp.
317
326
,
2012
.
2.
Y.
Feng
,
S.
Anand
,
I.
Dillig
, and
A.
Aiken
, “
Apposcopy: Semantics-based detection of android malware through static analysis
,” in
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering
,
2014
, pp.
576
587
.
3.
A.
Feizollah
,
N. B.
Anuar
,
R.
Salleh
,
G.
Suarez-Tangil
, and
S.
Furnell
, “
AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection
,”
Comput. Secur.
, vol.
65
, no. March, pp.
121
134
,
2017
.
4.
Y.
Zhang
,
M.
Yang
,
Z.
Yang
,
G.
Gu
,
P.
Ning
, and
B.
Zang
, “
Permission use analysis for vetting undesirable behaviors in android apps
,”
IEEE Trans. Inf. Forensics Secur.
, vol.
9
, no.
11
, pp.
1828
1842
,
2014
.
5.
S. hwan
Ju
,
H. suk
Seo
, and
J.
Kwak
, “
Research on android malware permission pattern using permission monitoring system
,”
Multimed. Tools Appl.
, vol.
75
, no.
22
, pp.
14807
14817
,
2016
.
6.
C.
Wang
,
Q.
Xu
,
X.
Lin
, and
S.
Liu
, “
Research on data mining of permissions mode for Android malware detection
,”
Cluster Comput.
,
2018
.
7.
W.
Enck
,
M.
Ongtang
, and
P.
Mcdaniel
, “
On Lightweight Mobile Phone Application Certification
,”
in Proc. 16th ACM Conf. Comput. Commun. Secur. CCS ’09
,
New York, NY, USA, ACM.
, pp.
235
245
,
2009
.
This content is only available via PDF.
You do not currently have access to this content.