Android Malware and Variant Detection Framework Leveraging Similarity Hashes

Welcome to DSpace BU Repository

Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.

Show simple item record

dc.contributor.author Alina Khalid, 01-247212-002
dc.date.accessioned 2023-12-19T05:05:33Z
dc.date.available 2023-12-19T05:05:33Z
dc.date.issued 2023
dc.identifier.uri http://hdl.handle.net/123456789/16845
dc.description Supervised by Dr. Faisal Bashir en_US
dc.description.abstract In the growing world of technology, the frequency and magnitude of cyber attacks is increasing day by day. Most popular OS are most prone to these attacks. Android OS is sharing a major share in OS market therefore facing the challenge of frequent and sophisticated malware attacks. These malware are created in a way to bypass network security systems. Major categories of malware remain the same however small modifications in malware can make it act differently and hence challenging to identify. Various techniques and algorithms are used for the identification and categorization of these variants to make better security and incidence responses. Fuzzy hashes are used to calculate the similarity index between files to identify malicious sections inside an appearing legitimate file. In this paper, research has been conducted to evaluate and improve the working, accuracy, and reliability of fuzzy hashes of static features of APK files in detecting Android malware and classifying its variants. In contrast to conventional research methodologies, our study adopts a distinctive static feature-based fuzzy hashing technique for the detection of malware and its variants. This approach has enabled us to achieve promising results in our experiments. We selected a dataset consisting of 2000 APK files, containing both malicious and benign samples. For variant identification and family classification, we’ve selected random malware families from six distinct categories: trojan, adware, spyware, virus, downloader, and hacktool. Through rigorous experimentation, our findings have demonstrated a significant improvement in key metrics such as precision, recall, and the F-Measure. These improvements collectively contribute to an overall enhancement in the accuracy, reaching 96.67%, all without the dependence on intricate machine learning or deep learning methods. en_US
dc.language.iso en en_US
dc.publisher Computer Sciences en_US
dc.relation.ispartofseries MS (IS);T-02080
dc.subject Android Malware en_US
dc.subject Variant Detection en_US
dc.subject Framework Leveraging en_US
dc.title Android Malware and Variant Detection Framework Leveraging Similarity Hashes en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account