De-LADY: Deep learning based Android malware detection using Dynamic features

Vikas Sihag
1, 2+, Manu Vardhan2, Pradeep Singh2, Gaurav Choudhary 3, and Seiil Son4
 

1Sardar Patel University of Police, Security and Criminal Justice, Jodhpur, India
vikas.sihag@policeuniversity.ac.in

 

2National Institute of Technology, Raipur, India
{mvardhan.cs, psingh.cs}@nitrr.ac.in

 

3School of Computing Science and Engineering, VIT Bhopal University, Bhopal, Madhya Pradesh, India
gauravchoudhary7777@gmail.com

 

4Korea Communication Agency, South Korea 

seiilson@kca.kr

 

Abstract

Popularity and market share of Android operating system has given significant rise to malicious apps targeting it. Traditional malware detection methods are obsolete as current malwares are equipped with state of the art obfuscation methods to hide their intent from scanning engines. In this paper, we propose De-LADY (Deep Learning based Android malware detection using DYnamic features) an obfuscation resilient approach. It utilizes behavioral characteristics from dynamic analysis of an application executed in emulated environment. The proposed approach is evaluated against 13533 applications from categories such as banking, gaming and utilities. De-LADY is effective with 98.08% detection rate and 98.84% F-measure. Furthermore, it outperformed existing machine learning approaches.

Keywords: Android, Malware detection, Code obfuscation, Familial classification

 

+: Corresponding author: Vikas Sihag
Department of Computer Science, Sardar Patel University of Police, Security and Criminal Justice, Lordi panditji village, Jodhpurku, India, Tel: +91-7728891698

 

Journal of Internet Services and Information Security (JISIS), 11(2): 34-45, May 2021

Received: February 5, 2021; Accepted: May 2, 2021; Published: May 31, 2021

DOI: 10.22667/JISIS.2021.05.31.034 [pdf]