TechRxiv
IEEE_Tran__Exfiltration_Project__Copy_.pdf (2.23 MB)

An ML-Based Recognizer of Exfiltration Attack over Android Platform: MLGuard

Download (2.23 MB)
preprint
posted on 2023-01-13, 15:14 authored by Martina Morcos, Mirko Gala, Hussam Al HamadiHussam Al Hamadi, sivaprasad nandyala, brian mcgillion, Ernesto Damiani

As Android smartphones continue to rise in popularity, the number of malicious programs targeting the platform has increased dramatically. Methods for efficiently detecting and preventing the spread of Android malware have become a subject of increasing urgency. The exfiltration of sensitive data from smartphones is one of the sophisticated security threats that need to be addressed. In this paper, we analyzed the 3-grams of system calls, and developed a framework for identifying malicious Android applications that engage in network data exfiltration. Androzoo, a recently made public database, serves as the foundation for our exfiltration dataset. The majority of published works rely on data acquired from Android emulators and user input simulation. As part of our research, we collect data on the behavior of exfiltration attempts only in real-world interaction, as opposed to data from emulators or virtual environments. Using these dynamic variables, we employ cutting-edge machine learning and deep learning classifiers, including Random Forest and deep neural network. It obtains an exfiltration detection accuracy of 98.9 percent using 20s time windows for detection. In addition, we applied our trained model on Android phones and attained minimal latency and high detection accuracy for unknown exfiltration applications.

Funding

8434000379

History

Email Address of Submitting Author

halhammadi@ud.ac.ae

ORCID of Submitting Author

0000-0002-1353-4138

Submitting Author's Institution

University of Dubai

Submitting Author's Country

  • United Arab Emirates