Skip to main content

Quorum Chain-Based Malware Detection in Android Smart Devices

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1113))

Abstract

Smart devices are gradually becoming indispensable in people’s daily lives, and Android-based smart devices are taking over the main stream in mobile devices. However, while Android smart devices bring convenience to customers, they also bring problems. Due to the open-sourced nature of the Android system, malicious programs and software attacks pose a significant security risk to user data. Therefore, the detection of malware has always been a critical issue. For a long time, various malware detection schemes have been proposed, which have gradually improved the detection of malware. Traditional detection methods are based on static or dynamic detection techniques. In recent years, with the advancement of technology, malware detection based on machine learning ideas has been widely used, such as K-NN, deep learning, decision trees, and so on. Blockchain has been widely used in many fields since its birth. This paper combines traditional detection methods and ensemble learning algorithms to propose a malware detection technology based on QuorumChain framework (blockchain technology). The experimental results verify that the proposed new model is better than other models in precision, recall and f1-measure.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. IDC.COM: Smartphone market share. https://www.idc.com/promo/smartphone-market-share/os. Accessed 30 June 2019

  2. National Computer Network Emergency Technical Processing Coordination Center. Specification for mobile internet malicious code, YD/T 2439 (2012)

    Google Scholar 

  3. Chen, K., Wang, P., Lee, Y., Wang, X., Zhang, N., Huang, H., et al.: Finding unknown malice in 10 seconds: mass vetting for new threats at the Google-play scale. In: Usenix Conference on Security Symposium. USENIX Association (2015)

    Google Scholar 

  4. Zhang, M., Duan, Y., Yin, H., Zhao, Z.: Semantics-aware Android malware classification using weighted contextual API dependency graphs (2014)

    Google Scholar 

  5. Xiao, X., Xiao, X., Jiang, Y., Liu, X., Ye, R.: Identifying Android malware with system call co-occurrence matrices. Trans. Emerg. Telecommun. Technol. 27(5), 675–684 (2016)

    Article  Google Scholar 

  6. Di Cerbo, F., Girardello, A., Michahelles, F., Voronkova, S.: Detection of malicious applications on Android OS. In: Sako, H., Franke, K.Y., Saitoh, S. (eds.) IWCF 2010. LNCS, vol. 6540, pp. 138–149. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19376-7_12

    Chapter  Google Scholar 

  7. Fuchs, A.P., Chaudhuri, A., Foster, J.S.: SCanDroid: automated security certification of Android applications (2009)

    Google Scholar 

  8. Shang, F., Li, Y., Deng, X., He, D.: Android malware detection method based on Naive Bayes and permission correlation algorithm. Cluster Comput. 21(8), 1–12 (2017)

    Google Scholar 

  9. Li, Y., Shen, T., Sun, X., Pan, X., Miao, B.: Detection, classification and characterization of Android malware using API data dependency. In: Thuraisingham, B., Wang, X., Yegneswaran, V. (eds.) SecureComm 2015. LNCS, vol. 164, pp. 23–40. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-28865-9_2

    Chapter  Google Scholar 

  10. Bhatia, T., Kaushal, R.: Malware detection in Android based on dynamic analysis. In: 2017 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). IEEE (2017)

    Google Scholar 

  11. Enck, W., Gilbert, P.: TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones. In: Proceedings of the Usenix Symposium on Operating System Design and Implementation, OSDI, Vancouver, BC, Canada, 4–6 October 2010, pp. 393–407. DBLP (2010)

    Google Scholar 

  12. Bläsing, T., Batyuk, L., Schmidt, A.D., Camtepe, S.A., Albayrak, S.: An Android application sandbox system for suspicious software detection. In: 2010 5th International Conference on Malicious and Unwanted Software (MALWARE). IEEE (2010)

    Google Scholar 

  13. Su, M.Y., Fung, K.T., Huang, Y.H., Kang, M.Z., Chung, Y.H.: Detection of Android malware: combined with static analysis and dynamic analysis. In: 2016 International Conference on High Performance Computing & Simulation (HPCS). IEEE (2016)

    Google Scholar 

  14. Yuan, Z., Lu, Y., Xue, Y.: Droiddetector: Android malware characterization and detection using deep learning. Tsinghua Sci. Technol. 21(1), 114–123 (2016)

    Article  Google Scholar 

  15. Zhang, X., Hu, D., Fan, Y., Yu, K.: A novel Android malware detection method based on Markov blanket. In: IEEE International Conference on Data Science in Cyberspace. IEEE (2016)

    Google Scholar 

  16. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf 《Consulted》

  17. Di Pierro, M.: What is the blockchain? IEEE Comput. Sci. Eng. 19, 92–95 (2017)

    Article  Google Scholar 

  18. Puthal, D., Malik, N.: The blockchain as a decentralized security framework [future directions]. IEEE Consum. Electron. Mag. 7(2), 18–21 (2018)

    Article  Google Scholar 

  19. Thomas, G.D.: Machine learning research: four current directions. AI Mag. 18(4), 97–136 (1997)

    Google Scholar 

  20. Zhihua, Z.: Machine Learning (Chinese Edition), pp. 171–191. Tsinghua University Press, Beijing (2016)

    Google Scholar 

  21. Cummins, M., Newman, P.: Probabilistic appearance based navigation and loop closing. In: IEEE International Conference on Robotics & Automation. IEEE (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Frank Jiang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gao, F., Jiang, F., Zhang, Y., Doss, R. (2019). Quorum Chain-Based Malware Detection in Android Smart Devices. In: Doss, R., Piramuthu, S., Zhou, W. (eds) Future Network Systems and Security. FNSS 2019. Communications in Computer and Information Science, vol 1113. Springer, Cham. https://doi.org/10.1007/978-3-030-34353-8_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-34353-8_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-34352-1

  • Online ISBN: 978-3-030-34353-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics