FABLDroid: Malware detection based on hybrid analysis with factor analysis and broad learning methods for android applications

The Android operating system, which is popular on mobile devices, creates concerns for users due to the malware it is exposed to. Android allows applications to be downloaded and installed outside the official application store. Applications installed from third-party environments threaten users’ pr...

Full description

Saved in:
Bibliographic Details
Main Authors: Kazım Kılıç, İsmail Atacak, İbrahim Alper Doğru
Format: Article
Language:English
Published: Elsevier 2025-02-01
Series:Engineering Science and Technology, an International Journal
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2215098624003318
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832087469015695360
author Kazım Kılıç
İsmail Atacak
İbrahim Alper Doğru
author_facet Kazım Kılıç
İsmail Atacak
İbrahim Alper Doğru
author_sort Kazım Kılıç
collection DOAJ
description The Android operating system, which is popular on mobile devices, creates concerns for users due to the malware it is exposed to. Android allows applications to be downloaded and installed outside the official application store. Applications installed from third-party environments threaten users’ privacy and security. Deep learning-based methods are popular for detecting Android malware. However, deep learning methods contain a large number of parameters and have high memory consumption and are graphics card dependent architectures. To overcome these difficulties, a detection architecture using lightweight Broad learning method that provides high detection performance as an alternative to layer stacking found in deep structures is presented. Our method is based on a lightweight deep neural network architecture based on broad learning to reveal hidden factors to detect Android malware. The proposed architecture uses the Factor Analysis (FA) dimension reduction method to reveal hidden factors within the hybrid features of Android applications. The features extracted by factor analysis are expanded using the broad learning method and fed to a deep neural network with two hidden layers. In the proposed method, the learning ability of the deep neural network architecture, which has strong computational ability, is increased with the broad learning technique. The Kronodroid dataset is used to validate our approach. The Kronodroid dataset is a dataset consisting of malware and benign applications, specifically designed to examine and explore the concept drift and cross-device detection issues in the problem domain. The Kronodroid dataset contains different datasets obtained from both real devices and emulator runtimes. The tests of our method were carried out separately with the features extracted in the real device and emulator runtime. In this way, the behaviors of malicious applications in different environments were compared. In order to verify the effectiveness of the factor analysis method, the classification performance was measured by extracting 32, 64, 128, and 256 features with different dimensionality reduction techniques. As a result of the experiments conducted using different rates of expansion with the broad learning method, a 98.20% accuracy value was achieved on the real device dataset with the proposed architecture. An accuracy value of 97.90% was produced on the emulator dataset. In order to compare the proposed method on different datasets, 4000 applications were downloaded from the Androzoo environment to create a hybrid feature dataset. The proposed method achieved 98.40% accuracy on the Androzoo dataset. The experimental results reveal that the broad learning method increases the performance compared to the raw features. The findings show that the proposed broad learning-based method exhibits successful performance compared to similar studies based on deep learning using ensemble learning methods and layer stacking.
format Article
id doaj-art-2d8cec25af0644e5b79cca0a1a6439a8
institution Kabale University
issn 2215-0986
language English
publishDate 2025-02-01
publisher Elsevier
record_format Article
series Engineering Science and Technology, an International Journal
spelling doaj-art-2d8cec25af0644e5b79cca0a1a6439a82025-02-06T05:11:51ZengElsevierEngineering Science and Technology, an International Journal2215-09862025-02-0162101945FABLDroid: Malware detection based on hybrid analysis with factor analysis and broad learning methods for android applicationsKazım Kılıç0İsmail Atacak1İbrahim Alper Doğru2IoTLab, Department of Computer Engineering, Gazi University, Ankara, Turkey; Department of Computer Engineering, Graduate School Natural of Applied Sciences, Gazi University, Ankara, Turkey; Corresponding author at: IoTLab, Department of Computer Engineering, Gazi University, Ankara, Turkey.IoTLab, Department of Computer Engineering, Gazi University, Ankara, TurkeyIoTLab, Department of Computer Engineering, Gazi University, Ankara, TurkeyThe Android operating system, which is popular on mobile devices, creates concerns for users due to the malware it is exposed to. Android allows applications to be downloaded and installed outside the official application store. Applications installed from third-party environments threaten users’ privacy and security. Deep learning-based methods are popular for detecting Android malware. However, deep learning methods contain a large number of parameters and have high memory consumption and are graphics card dependent architectures. To overcome these difficulties, a detection architecture using lightweight Broad learning method that provides high detection performance as an alternative to layer stacking found in deep structures is presented. Our method is based on a lightweight deep neural network architecture based on broad learning to reveal hidden factors to detect Android malware. The proposed architecture uses the Factor Analysis (FA) dimension reduction method to reveal hidden factors within the hybrid features of Android applications. The features extracted by factor analysis are expanded using the broad learning method and fed to a deep neural network with two hidden layers. In the proposed method, the learning ability of the deep neural network architecture, which has strong computational ability, is increased with the broad learning technique. The Kronodroid dataset is used to validate our approach. The Kronodroid dataset is a dataset consisting of malware and benign applications, specifically designed to examine and explore the concept drift and cross-device detection issues in the problem domain. The Kronodroid dataset contains different datasets obtained from both real devices and emulator runtimes. The tests of our method were carried out separately with the features extracted in the real device and emulator runtime. In this way, the behaviors of malicious applications in different environments were compared. In order to verify the effectiveness of the factor analysis method, the classification performance was measured by extracting 32, 64, 128, and 256 features with different dimensionality reduction techniques. As a result of the experiments conducted using different rates of expansion with the broad learning method, a 98.20% accuracy value was achieved on the real device dataset with the proposed architecture. An accuracy value of 97.90% was produced on the emulator dataset. In order to compare the proposed method on different datasets, 4000 applications were downloaded from the Androzoo environment to create a hybrid feature dataset. The proposed method achieved 98.40% accuracy on the Androzoo dataset. The experimental results reveal that the broad learning method increases the performance compared to the raw features. The findings show that the proposed broad learning-based method exhibits successful performance compared to similar studies based on deep learning using ensemble learning methods and layer stacking.http://www.sciencedirect.com/science/article/pii/S2215098624003318Broad learningAndroid malwareHybrid analysisFactor analysisArtificial intelligence
spellingShingle Kazım Kılıç
İsmail Atacak
İbrahim Alper Doğru
FABLDroid: Malware detection based on hybrid analysis with factor analysis and broad learning methods for android applications
Engineering Science and Technology, an International Journal
Broad learning
Android malware
Hybrid analysis
Factor analysis
Artificial intelligence
title FABLDroid: Malware detection based on hybrid analysis with factor analysis and broad learning methods for android applications
title_full FABLDroid: Malware detection based on hybrid analysis with factor analysis and broad learning methods for android applications
title_fullStr FABLDroid: Malware detection based on hybrid analysis with factor analysis and broad learning methods for android applications
title_full_unstemmed FABLDroid: Malware detection based on hybrid analysis with factor analysis and broad learning methods for android applications
title_short FABLDroid: Malware detection based on hybrid analysis with factor analysis and broad learning methods for android applications
title_sort fabldroid malware detection based on hybrid analysis with factor analysis and broad learning methods for android applications
topic Broad learning
Android malware
Hybrid analysis
Factor analysis
Artificial intelligence
url http://www.sciencedirect.com/science/article/pii/S2215098624003318
work_keys_str_mv AT kazımkılıc fabldroidmalwaredetectionbasedonhybridanalysiswithfactoranalysisandbroadlearningmethodsforandroidapplications
AT ismailatacak fabldroidmalwaredetectionbasedonhybridanalysiswithfactoranalysisandbroadlearningmethodsforandroidapplications
AT ibrahimalperdogru fabldroidmalwaredetectionbasedonhybridanalysiswithfactoranalysisandbroadlearningmethodsforandroidapplications