Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

  • Loading metrics

DyHAP: Dynamic Hybrid ANFIS-PSO Approach for Predicting Mobile Malware

Abstract

To deal with the large number of malicious mobile applications (e.g. mobile malware), a number of malware detection systems have been proposed in the literature. In this paper, we propose a hybrid method to find the optimum parameters that can be used to facilitate mobile malware identification. We also present a multi agent system architecture comprising three system agents (i.e. sniffer, extraction and selection agent) to capture and manage the pcap file for data preparation phase. In our hybrid approach, we combine an adaptive neuro fuzzy inference system (ANFIS) and particle swarm optimization (PSO). Evaluations using data captured on a real-world Android device and the MalGenome dataset demonstrate the effectiveness of our approach, in comparison to two hybrid optimization methods which are differential evolution (ANFIS-DE) and ant colony optimization (ANFIS-ACO).

Introduction

The ubiquity and popularity of mobile devices is likely to increase in the foreseeable future. For example, according to the Global Web Index, 80% of Internet users own at least a smartphone and the online mobile shopping showed 150% increase in 2015 compared to 2014 [1]. Due to the widespread use of mobile devices and the amount of personal information stored on these devices, they have become the targets of cybercriminals such as malware authors and hackers [25]. Android devices are one of the most targeted platforms due to its market share, and open nature of the operating system [69]. One popular mitigation strategy used by mobile device users is anti-malware app. However, a recent systematic evaluation of popular free Android cloud-based anti-malware apps concluded:

that no single cloud anti-malware app can be solely relied upon to mitigate known malware. The findings were also concerning, particularly that malware threats are becoming more sophisticated and targeted, using various attack vectors to escalate permissions and exfiltrate data [10]

Not surprisingly, mobile security and malware detection has been the subject of recent research. In order to detect malware, one could deploy an intrusion detection system (IDS) which can be either anomaly-based or signature-based (also called behavioral-based). The signature-based approach relies on a predefined pattern or malware signature. While such approach is popular, they are ineffective in detecting unknown malware [11,12]. Unlike signature-based detection, the anomaly-based approach seeks to differentiate between normal and abnormal conditions. For example, abnormal conditions include specific malware characteristics (e.g. malware code and its logical structure) or behaviors, identified during the analysis of such applications (i.e. malware analysis).

Malware analysis, a process of understanding how a particular piece of malware functions by dissecting and studying the code and its behavior with the aims of mitigating the threat [13], can be broadly categorized into static or dynamic analysis. Techniques such as machine learning have been utilized to differentiate normal and abnormal patterns in suspicious applications. For example, Dimitrios et al. [14] evaluated the suitability of five machine learning classifiers, namely: Radial Basis Function (RBF), Bayesian Networks, K-Nearest Neighbors (KNN) and Random Forest in detecting anomalies on mobile devices. Similarly, Feizollah et al. [15] analyzed the performance of machine learning classifiers in detecting Android malware and findings as high as 99.94% detection rate for KNN. Despite the amount of efforts on the topic, mobile malware detection remains a topic of active research (and the focus of this paper).

In recent times, a number of studies have seek to evaluate the effectiveness of computational intelligence-based solution for improved performance [16]. For example, FUGE [17] uses fuzzy theory and genetic method in cloud job scheduling algorithm. Findings from the authors’ evaluations suggested the approach is efficient in terms of execution time, execution cost, and average degree of imbalance. Similarly, FR-TRUST [18] uses fuzzy theory to compute a peer trust level, and has been demonstrated to provide a high—ranking accuracy. In the study of malware, however, there are relatively few research works that use the fuzzy inference system because this is a complex NP problem. It is unlikely that efficient algorithms for solving this problem are deterministic; hence, the interest in heuristic algorithms.

We introduce an integrated method to detect mobile malware in this paper. Specifically, we use neural network function and regression to generalize the relationships between inputs based on the Adaptive Neuro-Fuzzy Inference System (ANFIS). The particle swarm optimization was also combined in our approach in order to optimize the malware prediction model. We then seek to evaluate the effectiveness of our approach and compare its performance with other hi-tech soft computing hybrid approaches.

The rest of this paper is structured in sections as follows: review of the related work (see Section 2), research methodology (see Section 3), proposed ANFIS framework (see Section 4), and evaluation of findings (see Section 5). Finally, the last section concludes this study.

Related Work

Malware detection approaches are categorized into anomaly-based and signature-based detection [19]. The signature-based method finds malware by comparing collected information from monitored users and system activities to an existing list of known malicious files database (i.e. malware signatures) [20]. While this approach has worked in the past, it is largely ineffective against new malware whose signature does not yet exist, or malware that uses “oligomorphic”, “polymorphic” and “metamorphic” to avoid detection by encrypting or modifying parts of the code [21]. Such an approach also requires user to constantly update the signature database. Anomaly-based approach monitors and analyzes network traffic, system, user activity levels, etc. for a particular pattern of behavior. An intrusion is flagged when there is a deviation from the normal behavior patterns [22]. Machine learning classifiers, such as support vector machine, neural network, genetic algorithm, fuzzy logic, and decision tree, have been used in malware detection models [23]. To optimize malware detection model, selection of particular features is important in the machine learning classification process.

Malware analysis can be static or dynamic [24]. In static analysis, a program is examined by inspection without execution the actual application. Such process is normally performed manually by malware analysts to understand the logical structure, flow and data content stored within the binary itself, behavior of the suspicious application, etc. [25,26], [27]. For instance using Android Application Package (APK) file, [28] and [29] used file permissions as key reference points to detect malware on Android devices. However, Android malware such as DroidKungFuUpdate can avoid from being detected by not requesting access to suspicious permissions [30]. Do, Martini and Choo [31] in a recent work demonstrated how data can be exfiltrated from an Android device using inaudible sound waves via the device’s speaker, which requires no permission. With the constant evolution of (mobile) malware and significant increase in the number of applications, it would be impossible to manually analyze all suspicious applications. In dynamic analysis, application activities such as network traffic and system calls are analyzed while the application is running. For example, Crowdroid [32] collected the device’s kernel system calls to determine the application patterns. However, collecting system calls is a complicated task which requires device to be rooted. This can result in devices being more vulnerable to malicious exploitation. Yerima et. al [33] analyzed requested permissions of 2000 applications and determined that more than 93% of malware applications request for network connectivity (e.g. to communicate with the command and control server and to exfiltrate data). This indicated that, malicious applications tend to use network more than normal applications. Hence, we focus on analyzing mobile network traffic.

A variable selection process through the ANFIS was used to find the most significant parameters in malware detection. The aim was to find a subset of the logged variables that shows good prognostic abilities [3436], and one can filter irrelevant variables by use of former knowledge. Donald A. [37] proposed genetic algorithm (GA) based variable selection for optimization, which aim to decrease the error between true values and prediction model by choosing the suitable explanatory variables (input). the ANFIS [38,39] was employed as a powerful tool for the variable selection in this paper. ANFIS has also been used in several engineering fields for modelling [4043], predictions [4446] and control [4750]. The main idea of neuro-adaptive learning methods is to perform the fuzzy modelling procedure for data learning [51,52]. The ANFIS forms the fuzzy inference system with pairs (input/output) of data [53]. This approach enables fuzzy logic to adapt the membership function parameters to best track the given input/output data by the fuzzy inference system.

Metaheuristic optimization algorithms have become popular choice for solving complex problem [54]. As pointed out by one of the reviewers that combining ANFIS and Particle Swarm Optimization (PSO) for prediction problems has been widely studied and understood [5557]. Pooranian and Shojafar [58], for example, proposed combining PSO with the gravitational emulation local search (GELS) to solve the independent task scheduling problem in grid computing. Jiang also proposed a PSO based ANFIS approach to improve accuracy in modelling customer satisfaction, and demonstrated that such an approach achieves better performance than fuzzy regression (FR), ANFIS and Genetic Algorithm (GA) based ANFIS approaches [59]. Other combinations of PSO and ANFIS have been proposed in forecasting such as in short-term wind power [60], and spur dike’s parameters [61]. In order to increase its accuracy and performance, this paper applied three optimization techniques to ANFIS which are ANFIS-PSO (ANFIS-particle swarm optimization), ANFIS-DE (ANFIS-differential evolutionary) and ANFIS-ACO (ANFIS-ant colony optimization). These hybrid algorithms help improve the ANFIS performance by tuning the membership function towards zero error analysis.

Research Methodology

This section describes our experiment setup, which consists of two phases, namely: data collection, and feature selection, extraction and labelling phase.

Data Collection

We gathered and analyzed network traffic developed by Android apps. In this phase, different approaches were used to capture malware and normal network traffic (Fig 1).

Twenty popular (and reputable) apps from four different app categories were downloaded from Google Play and installed on a mobile device running Android operating system Jelly Bean version 4.1.2 (see Table 1). Prior to installation, we checked the authenticity of the apps. The network traffic from running these apps was captured in a real-time network environment, where each app was run for 30 minutes.

Of the 1260 malware data samples from 49 families in the Malgenome [30] dataset, we captured the network patterns of 1,000 samples. The samples were analyzed in real-time with public malware-detection sandbox, namely: Anubis Iseclab [62] and automatic Android program analysis, SanDroid [63], since the malware data samples in the dataset were generated by these platforms.

Feature Selection, Extraction and Labelling

In this multi agent system architecture (Fig 2), three system agent is proposed to capture and manage the pcap file for data preparation phase. The details of each agent and its role are given in the next section.

Sniffer Agent.

In the sniffer agent, the pcap file is capture from the network connection between mobile apps and internet. Sniffer module using tShark (a network protocol analyzer) [64], to retrieved all related information (see Fig 3). Later the sniffed data is fed to extraction agent.

Extraction Agent.

Extraction agent consist of filter module which filter the collected network traffic using Java and Wireshark routine to clear the captured packets from unwanted data. For example, we only use TCP packets in the network traffic data and remove UDP and Domain name system (DNS) packets from it. The pseudocode of this module is shown in Fig 4.

Selection Agent.

This agent is one of the most important agents in this model. This agent has two modules which is Feature Module and Label Module. Feature Module choose a number of features to be used as main attributes to classify mobile malware. The features were chosen from a wide range of features in unbiased packet level features of the TUIDS intrusion dataset. The main challenge in this phase was to identify the best applicable features in particular, which result in higher detection accuracy and avoiding an overfitting model. The dataset needs to be filtered and refined from numerous excessive features. Some of the features are linked, which can complicate the process of malware detection. Furthermore, features with redundant information from other features may reduce the detection model accuracy and increase computational time and complexity of the model. In this study, a specific method to select the best attributes from machine learning tool Weka [65] called ClassifierSubsetEval was applied.

We choose seven connection-based features to analyze, as shown in Table 2. The extracted features were stored as a sequence of comma separated values (CSV) file. Next, after dataset was extracted with selected features, it was passed to Label module which labeled the dataset according to Fig 5. This phase remove noise in dataset and to ensure experiment validity. The final dataset from a combination of normal and infected data consists of three hundred thousand rows of data with seven features, prior to splitting into 70% training and 30% testing dataset. In order to avoid overfitting issue, we train our model with a wide range of examples and split datasets.

Proposed Approach

We introduce an approach in this paper that combines adaptive neuro fuzzy inference system (ANFIS) and particle swarm optimization (PSO). We used PSO to improve performance of ANFIS by adjusting the membership functions and minimizing the error. Forecasts from ANFIS can be used to reconstruct future behavior of the malware.

Particle swarm optimization (PSO)

PSO is an approach for optimizing “continue” and “discontinue” decision making functions, which develop by Dr. Kennedy and Dr. Eberhart in 1995 [55]. PSO has been used to model animals’ sociological and biological behavior (like groups of birds searching for food) [66]. The PSO has also been employed in population-based search approach, in which a particle of a population is present for each individual potential solution or swarm. In this method, the position of particle is changed constantly in a search space until reaching to the optimum solutions and computational restrictions are reached.

Former experiential research shows the efficiency and advantages of the mentioned method for optimization [67], [68].

For example, in an optimization issue with D variables, a swarm of N particles is established in a way that every particle will be allotted to an arbitrary position in the hyperspace with D measurements. Position of each particle for this situation is associated with a possible answer for the optimization matter. Both v and x are flight speed of a particle over a solution space and its position (direction). A scoring capacity is allocated to every individual x in the swarm, which gains a wellness value. The latter is an indication of its competence to address the issues.

A particle’s best prior position is represented by Pbest, and Gbest signifies the best swarm particle. Each particle can log its own Pbest and find its Gbest. Subsequently, all particles that move over the D-dimensional solution space should follow the rules updated for new positions until they achieve optimum position. The subsequent deterministic and stochastic update rules show how a particle’s position and velocity are updated (Eq 1): (1) (2)

In the above equation, random variables are shown by q1 and q2 and x represents an inertia weight.

Positive acceleration constants are represented by C1 and C2 and the random variables are outlined as q1 = r1c1 and q2 = r2c2, with (r1, r2, U(0,1)). The stochastic and weights of growing speed terms that lead to a particle reaching to the Gbest and Pbest have speeding up constants of C1 and C2. A particle can move a long distance from the target locales when the qualities are few, while huge qualities cause the abrupt particles development to target locales. In line with the average practice in [69], both C1 and C2 constants are equal to 2.0 in this study. In Eq 2, the best likely amendment of dormancy x provides a harmony between the nearby and worldwide examinations, which reduces the amount of emphases on finding an ideal arrangement. A latency rectification capacity called the IWA or “idleness weight approach” was used in this exploration work [69,70]. The x (latency weight) is changed amid the IWA according to the associated relationship: (3)

In Eq 3, xmax and xmin represent the primary and ultimate inertia weights, the current number of iteration is represented by Itr and the maximum number of iteration is represented by Itrmax.

ANFIS

The term adaptive neuro-fuzzy inference system was introduced by Jang, 1993 refer to combination of Fuzzy Logic and Artificial Neural Network to produce a powerful processing tool [71]. For every input, two fuzzy if-then rule were generate in this study with maximum equal to 1 and minimum equal to 0. Fig 6 shows the ANFIS arrangement and inputs.

Assume two inputs fuzzy if-then rules of Takagi and Sugeno’s type [72] were adopted: (4)

Layer 1 contains membership functions (MFs) of input variables and feed input values for the next layer. Each node in 1st layer is adaptive as: o = μ(i), where μ(i)i are membership functions.

The bell-shaped membership functions (Fig 7) is presented in Eq 5 for which the lowest and highest amounts are 0 and 1, respectively.

(5)
thumbnail
Fig 7. Three parameters in bell membership function; (a, b and c).

https://doi.org/10.1371/journal.pone.0162627.g007

The function is subject to the following parameters, namely a, b and c. Each of these parameters define as follows: a is half width of the curve; b defines the gradient together with a; and c is the midpoint of the membership function as shown in Fig 7.

In the 2nd layer (the membership layer), the weight of MFs is considered. The first layer provides the input values for layer 2. The nodes in the second layer are fixed node. The output is the product from all incoming signals and be described as, (6)

Output of every node indicates the weight strength of a rule.

In layer 3 which is the rule layer, every node does the pre-condition matching of the fuzzy rules, that calculate each rule’s activation level as well as the normalized firing strength. This is a fixed layer as well, and each node computes the proportion of ith rule of the firing strength to the sum of ith firing strengths of all rules as: (7)

The outputs of this layer are named as normalized weights or firing strengths.

In layer 4 or defuzzification layer, all the adaptive nodes provide the resulting output values from the inference of rules.

(8)

Here, the parameters set is shown as {pi, qi, ri, si, t}.

Layer 5 or the output layer summarizes the inputs output from layer 4. This layer also transforms the results of fuzzy classification into a crisp. Here, the single node is fixed node and the whole incoming signals is sum up to produce overall output as below, (9)

The PSO method was used in this paper to help ANFIS adjust the membership function parameters [70]. The main advantage of PSO technique is its friendly way of calculation in a network topology of given size. The membership functions were triangular in this study.

ANFIS-PSO algorithm

Fig 8 depicts the diagram of the sequential PSO and ANFIS combination [73]. In PSO, swarm starts with a group of random solutions, each of which is called a particle, and represents the particle’s position. Likewise, a particle swarm moves in the problem space, where expresses the particle’s velocity. A function f is evaluated at each time step through input . Every particle records its best position related to the best fitness gained to this point, in vector. tracks the most appropriate position identified by any neighborhood member. In universal version of PSO, represents the most appropriate point in the entire population. A new velocity is achieved for any particle i in each iteration according to the best positions of individual, , and neighborhood. The new velocity can be presented by: (10)

thumbnail
Fig 8. Diagram of sequential combination of PSO and ANFIS.

https://doi.org/10.1371/journal.pone.0162627.g008

In Eq 10, w represents the inertia weight. The positive acceleration coefficients are shown by c1 and c2. and represent uniformly-distributed random vectors in [0,1], in which a random value is tried for every dimension. limit in the [-, ] series is reliant on the problem. Provided that the velocity exceeds the mentioned limit, in some cases it is rearranged within its suitable limits. The position of every particle alters depending upon the velocities as follows (11)

According to Eqs 10 and 11, the particles incline to gather nearby the best. PSO use for designing a FS, or parameter optimization is expressed as: (12)

Here, αi is a crisp value, k represents the time step, the input variables are x1(k), …, xn(k), Aij is a fuzzy set and u(k) signifies the output variable for system.

For the FS in Eq 12 which comprises r rules and n input variables, its free parameters are defined through a position vector: (13) (14)

Following the process of rule creation and initialization, the preliminary antecedent part parameters are outlined. According to Eqs 13 and 14, the ith solution vector is created as: (15)

In the equation, Δmij and Δbij signify the numbers of small random, αi designates a random number distributed arbitrarily and homogeneously in the fuzzy system output range. The evaluation function f for is calculated based upon the fuzzy system performance in Eq 15.

PSO looks for the best originator part parameters. Ps represents the population size. Eq 4 sets the elements in position . When t = 0, the or initial positions are created arbitrarily according to the best-performing FS found in ACO (). is considered similar to . The left Ps − 1 particles, , are created by addition of uniformly-distributed random numbers to shown as: (16)

represents a random vector. The primary speed values of all particles, , are generated randomly. Each particle’s performance is evaluated according to the FS it signifies. f is described as the E(t) or error index mentioned above. The best position () of each particle and the best particle in the whole population is obtained according to f. Eqs 10 and 11 overhaul the velocity and position of each particle. The whole learning procedure is accomplished as soon as a pre-defined paradigm is obtained [73].

There are five PSO main parameters used during conducting experiment as shown in Table 3, which are maximum number of iterations, population size of the domain, inertia weight damping ratio and inertia weight, global learning coefficient and personal learning coefficient. For this case study, we determined these parameters optimum values by trial and error procedure.

Evaluation of model performances

Statistical tests offer a certain level of assurance about the validity, non-randomness of the [74]. Specifically, in this paper, we used root mean square error (RMSE), Eq 17 and coefficient of determination (R2), Eq 18 to compare forecasting errors of between different models and determine the proportion of the variance of one variable that is predictable from the other variable, respectively.

The following are the statistical indicators adopted to examine the ANFIS model performance:

  1. root-mean-square error (RMSE) (17)
  2. Coefficient of determination (R2) (18) n is the total number of test data, Pi = measurement values and Oi = ANFIS value.

Evaluations

Simulation findings

The preliminary data aids in creating the hybrid soft computing method, and three methods were principally used to predict the data. The scatterplot in Fig 9 shows the estimation of best mobile malware parameters. Next, the fit line with equation y = α0 + αl was generated.

thumbnail
Fig 9. Performance of ANFIS-DE, ANFIS-ACO and ANFIS-PSO for estimation of mobile malware.

(a) ANFIS-DE fit line. (b) ANFIS-ACO fit line. (c) ANFIS-PSO fit line.

https://doi.org/10.1371/journal.pone.0162627.g009

Performance analysis

The available experimental data were used for assessing the performance of methods and identifying importance of the parameters. The R2 and RMSE were used to make comparison between the real and predicted values for the soft computing method. Tables 4 and 5 present the summary of comparison between ANFIS-DE, ANFIS-PSO and ANFIS-ACO. The performance analysis prediction of mobile malware using ANFIS-PSO is presented in Fig 10.

thumbnail
Table 4. Analysis of Mean Square Error (MSE) and Standard Deviation (StD) for different methods.

https://doi.org/10.1371/journal.pone.0162627.t004

thumbnail
Table 5. Analysis of performance for different methods to identify the optimum parameters of a mobile malware prediction model.

https://doi.org/10.1371/journal.pone.0162627.t005

thumbnail
Fig 10. Prediction of the optimum parameters of mobile malware analysis by ANFIS-PSO for testing data.

https://doi.org/10.1371/journal.pone.0162627.g010

The ANFIS-PSO decision surface for mobile malware detection is shown in Fig 11 for the two extracted parameters, Maximum_Frame and Frame_STD.

thumbnail
Fig 11. ANFIS-PSO decision surface for the detection model: input1—Maximum_Frame, input2—Frame_STD.

https://doi.org/10.1371/journal.pone.0162627.g011

It can be noted from Fig 10, when the model output is smaller than 0.5, the decision should be uninfected and when the model output is larger than 0.5 the decision should be infected. Finally based on this observation, we created SIMULINK block diagram for ANFIS-PSO detection of android mobile malware Fig 12.

thumbnail
Fig 12. SIMULINK block diagram for ANFIS-PSO detection of android mobile malware.

https://doi.org/10.1371/journal.pone.0162627.g012

Conclusion

The number and sophistication of Android malware are increasing and evolving, which necessitates the development of more effective malware detection systems. Recent advances in the literature suggests that artificial intelligence techniques are a promising approach to detect mobile malware. Generally, mobile malware communicates with a compromised server or a server under the control of an attacker, via a network. Thus, in this work, we focused on network based features. Specifically, application traffic was filtered for its parameters and calculation was performed on these parameters to obtain the required features. We also proposed three system agents to capture and manage the pcap file for the data preparation phase to improve our detection system in terms of efficient data processing.

It is known that ANFIS scheme is computationally efficient and well-adaptable with optimization and adaptive techniques. This scheme can also be combined with expert systems and rough sets for other applications, as well as used with other systems to handle more complex parameters. Another advantage of ANFIS is its speed of operation, which is much faster than in other control strategies. The laborious task of training membership functions is performed in ANFIS using metaheuristic optimization algorithms (due to the nature of fuzzy systems).

A novel hybrid method (integrating ANFIS and PSO) was proposed in this study to forecast the best parameters of a mobile malware analysis. The ANFIS-PSO is compared with two hybrid optimization approaches, namely: ANFIS-ACO and ANFIS-DE. Our findings demonstrated the utility of the proposed method. For example, ANFIS-PSO outperforms other approaches with RMSE, 0.43133 in training and 0.43106 in testing. Its coefficient of determination (R2) also achieves an improved performance (e.g. 0.7692 in training and 0.7721 in testing). For example, a majority (77%) of the variations in predicted result can be explained by the linear relationship between actual value and predicted model. This suggests that the prediction model has a strong positive linear correlation in terms of its accuracy in predicting and detecting Android malware.

Future work includes extending the research to a refined selection of variables (e.g. due to evolution of malware). Another potential research area is to address the known challenges in the selection of input variables, such as identifying and discarding irrelevant variables (noise). It is, therefore, useful to design methods that require reduced number of input variables (i.e. reducing the complexity of the model) yet achieving better efficiency and accuracy.

Acknowledgments

This work was supported by the Ministry of Science, Technology and Innovation, under Grant eScienceFund 01-01-03-SF0914.

Author Contributions

  1. Conceptualization: FA NBA SS KKRC.
  2. Data curation: FA NBA.
  3. Formal analysis: FA SS.
  4. Funding acquisition: NBA SS.
  5. Investigation: FA NBA.
  6. Methodology: FA NBA SS.
  7. Project administration: NBA SS.
  8. Resources: FA NBA SS.
  9. Software: FA NBA SS.
  10. Supervision: NBA SS.
  11. Validation: FA NBA SS KKRC.
  12. Visualization: FA SS.
  13. Writing – original draft: FA NBA SS KKR.
  14. Writing – review & editing: FA SS KKR.

References

  1. 1. Global Web Index. 80 of internet users own a smartphone [Internet]. 2015 [cited 5 Dec 2015]. Available: https://www.globalwebindex.net/blog/80-of-internet-users-own-a-smartphone
  2. 2. Choo KKR. The cyber threat landscape: Challenges and future research directions. Comput Secur. Elsevier Ltd; 2011;30: 719–731.
  3. 3. Azfar A, Choo KKR, Liu L. Android mobile VoIP apps: a survey and examination of their security and privacy. Electron Commer Res. Springer US; 2015;16: 1–39.
  4. 4. Farnden J, Martini B, Choo K-KR. Privacy Risks in Mobile Dating Apps. 2015; 1–16. Available: http://arxiv.org/abs/1505.02906
  5. 5. Do Q, Martini B, Choo KKR. A forensically sound adversary model for mobile devices. PLoS One. 2015;10: 1–15.
  6. 6. CNET. Android nabs 53% of US smartphone activations in Q1 [Internet]. 2014 [cited 1 Jun 2014]. Available: http://www.cnet.com/news/android-nabs-53-percent-of-us-smartphone-activations-in-q1
  7. 7. Theverge. Android is now used by 1.4 billion people [Internet]. 2015 [cited 30 Sep 2015]. Available: http://www.theverge.com/2015/9/29/9409071/google-android-stats-users-downloads-sales
  8. 8. Techcrunch. Android Accounted For 79% Of All Mobile Malware In 2012, 96% In Q4 Alone, Says F-Secure [Internet]. 2013 [cited 1 Jan 2013]. Available: http://techcrunch.com/2013/03/07/f-secure-android-accounted-for-79-of-all-mobile-malware-in-2012-96-in-q4-alone/
  9. 9. F-Secure. Q2 2014 Mobile Threat Report [Internet]. 2014 [cited 1 Jun 2014]. Available: https://www.f-secure.com/documents/996508/1030743/Threat_Report_H1_2014.pdf
  10. 10. Walls J, Choo K-KR. A Review of Free Cloud-Based Anti-Malware Apps for Android. 2015 IEEE Trust. 2015; 1053–1058.
  11. 11. García-Teodoro P, Díaz-Verdejo J, Maciá-Fernández G, Vázquez E. Anomaly-based network intrusion detection: Techniques, systems and challenges. Comput Secur. 2009;28: 18–28.
  12. 12. Damshenas M, Dehghantanha A, Choo K-KR, Mahmud R. M0Droid: An Android Behavioral-Based Malware Detection Model. J Inf Priv Secur. 2015;11.
  13. 13. Distler D. Malware Analysis: An Introduction [Internet]. Information Security. 2001. Available: https://www.sans.org/reading-room/whitepapers/malicious/malware-analysis-introduction-2103
  14. 14. Dimitrios D, Sofia AM, Georgios K, Papadaki M, Clarke N, Stefanos G. Evaluation of Anomaly-Based IDS for Mobile Devices Using Machine Learning Classifier. Secur Commun Networks. 2011;0: 1–9.
  15. 15. Feizollah A, Anuar NB, Salleh R, Narudin FA, Ma’arof RR, Shamshirband S. A Study Of Machine Learning Classifiers for Anomaly-Based Mobile Botnet Detection. Malaysian J Comput Sci. 2014;Volume 26. Available: http://umrefjournal.um.edu.my/public/article-view.php?id=5985
  16. 16. Zainab AN, Anuar NB. A single journal study: Malaysian Journal of Computer Sciences. Malaysian J Comput Sci. 2009;22: 1–18.
  17. 17. Shojafar M, Javanmardi S, Abolfazli S, Cordeschi N. FUGE: A joint meta-heuristic approach to cloud job scheduling algorithm using fuzzy theory and a genetic method. Cluster Comput. Springer US; 2015;18: 829–844.
  18. 18. Javanmardi S, Shojafar M, Shariatmadari S, Ahrabi SS. FR TRUST: A Fuzzy Reputation Based Model for Trust Management in Semantic P2P Grids. Int J Grid Util Comput. 2014; 1–11.
  19. 19. Inayat Z, Gani A, Anuar NB, Khan MK, Anwar S. Intrusion response systems: Foundations, design, and challenges. J Netw Comput Appl. Elsevier; 2015;
  20. 20. Razak MFA, Anuar NB, Salleh R, Firdaus A. The rise of “malware”: Bibliometric analysis of malware study. J Netw Comput Appl. Elsevier; 2016;
  21. 21. Szor P. The Art of Computer Virus Research and Defense. Addison-Wesley Professional. 2005.
  22. 22. Scarfone K, Mell P. Guide to Intrusion Detection and Prevention Systems (IDPS). NIST Spec Publ. 2012;1: 111.
  23. 23. Sangkatsanee P, Wattanapongsakorn N, Charnsripinyo C. Practical real-time intrusion detection using machine learning approaches. Comput Commun. Elsevier B.V.; 2011;34: 2227–2235.
  24. 24. Egele M, Scholte T, Kirda E, Barbara S. A survey on automated dynamic malware analysis techniques and tools. ACM Comput Surv. 2011;V: 1–49.
  25. 25. D’Orazio C, Choo KKR. An adversary model to evaluate DRM protection of video contents on iOS devices. Comput Secur. Elsevier Ltd; 2016;56: 94–110.
  26. 26. Dorazio C, Choo KKR. A generic process to identify vulnerabilities and design weaknesses in iOS healthcare apps. Proc Annu Hawaii Int Conf Syst Sci. 2015;2015-March: 5175–5184.
  27. 27. Sharif M, Yegneswaran V, Saidi H, Porras P, Lee W. Eureka: A framework for enabling static malware analysis. Lect Notes Comput Sci (including Subser Lect Notes Artif Intell Lect Notes Bioinformatics). 2008;5283 LNCS: 481–500.
  28. 28. Huang C, Tsai Y, Hsu C. Performance Evaluation on Permission-Based Detection for Android Malware. Proceedings of the International Computer Symposium ICS. 2012. pp. 111–120.
  29. 29. Van Der Merwe H. Analysis of Android applications. 2012; 1–7.
  30. 30. Zhou Y, Jiang X. Dissecting Android malware: Characterization and evolution. Proc—IEEE Symp Secur Priv. 2012; 95–109.
  31. 31. Do Q, Martini B, Choo KKR. Exfiltrating data from Android devices. Comput Secur. Elsevier Ltd; 2015;48: 74–91.
  32. 32. Burguera I, Zurutuza U, Nadjm-Tehrani S. Crowdroid. Proc 1st ACM Work Secur Priv smartphones Mob devices—SPSM ‘11. 2011; 15.
  33. 33. Yerima SY, Sezer S, McWilliams G. Analysis of Bayesian Classification-based Approaches for Android Malware Detection. Inf Secur IET. 2014;8: 25–36.
  34. 34. Castellano G, Fanelli AM. Variable selection using neural-network models. Neurocomputing. 2000;31: 1–13.
  35. 35. Dieterle F, Busche S, Gauglitz G. Growing neural networks for a multivariate calibration and variable selection of time-resolved measurements. Anal Chim Acta. 2003;490: 71–83.
  36. 36. Andersson FO, Åberg M, Jacobsson SP. Algorithmic approaches for studies of variable influence, contribution and selection in neural networks. Chemom Intell Lab Syst. 2000;51: 61–72.
  37. 37. Sofge DA. Using Genetic Algorithm Based Variable Selection to Improve Neural Network Models for Real-World Systems. Artif Intell. 2002;
  38. 38. Chan KY, Ling SH, Dillon TS, Nguyen HT. Diagnosis of hypoglycemic episodes using a neural network based rule discovery system. Expert Syst Appl. Elsevier Ltd; 2011;38: 9799–9808.
  39. 39. Kwong CK, Wong TC, Chan KY. A methodology of generating customer satisfaction models for new product development using a neuro-fuzzy approach. Expert Syst Appl. Elsevier Ltd; 2009;36: 11262–11270. http://dx.doi.org/10.1016/j.eswa.2009.02.094
  40. 40. Samhouri M, Al-Ghandoor A, Fouad RH, Hakim AH, Vasant P, Barsoum N. Electricity Consumption in the Industrial Sector of Jordan: Application of Multivariate Linear Regression and Adaptive Neuro-Fuzzy Techniques. AIP Conf Proc. 2009; 135–143.
  41. 41. Singh R, Kainthola A, Singh TN. Estimation of elastic constant of rocks using an ANFIS approach. Appl Soft Comput J. Elsevier B.V.; 2012;12: 40–45.
  42. 42. Petković D, Issa M, Pavlović ND, Pavlović NT, Zentner L. Adaptive neuro-fuzzy estimation of conductive silicone rubber mechanical properties. Expert Syst Appl. 2012;39: 9477–9482.
  43. 43. Petković D, Ćojbašić Ž. Adaptive neuro-fuzzy estimation of autonomic nervous system parameters effect on heart rate variability. Neural Comput Appl. 2012;21: 2065–2070.
  44. 44. Hosoz M, Ertunc HM, Bulgurcu H. An adaptive neuro-fuzzy inference system model for predicting the performance of a refrigeration system with a cooling tower. Expert Syst Appl. 2011;
  45. 45. Khajeh A, Modarress H, Rezaee B. Application of adaptive neuro-fuzzy inference system for solubility prediction of carbon dioxide in polymers. Expert Syst Appl. Elsevier Ltd; 2009;36: 5728–5732.
  46. 46. Sivakumar R, Balu K. ANFIS based Distillation Column Control. Int J Comput Appl. 2010;ecot: 67–73.
  47. 47. Kurnaz S, Cetin O, Kaynak O. Adaptive neuro-fuzzy inference system based autonomous flight control of unmanned air vehicles. Expert Syst Appl. Elsevier Ltd; 2010;37: 1229–1234.
  48. 48. Ravi S, Sudha M, Balakrishnan PA. Design of intelligent self-tuning GA ANFIS temperature controller for plastic extrusion system. Model Simul Eng. 2011;2011.
  49. 49. Areed FG, Haikal AY, Mohammed RH. Adaptive neuro-fuzzy control of an induction motor. Ain Shams Eng J. Faculty of Engineering, Ain Shams University; 2010;1: 71–78.
  50. 50. Petković D, Issa M, Pavlović ND, Zentner L, Ćojbašić Ž. Adaptive neuro fuzzy controller for adaptive compliant robotic gripper. Expert Systems with Applications. 2012. pp. 13295–13304.
  51. 51. Aldair AA, Wang WJ. Controller design for an autonomous underwater vehicle using nonlinear observers. Int J smart Sens Intell Syst. 2011;4: 224–243.
  52. 52. Dastranj MR, Ebroahimi E, Changizi N, Sameni E. Control DC Motorspeed with Adaptive Neuro-Fuzzy control (ANFIS). Aust J Basic Appl Sci. 2011;5: 1499–1504.
  53. 53. Manoj SBA. Identification and Control of Nonlinear Systems using Soft Computing Techniques. Int J Model Optim. 2011;1: 24.
  54. 54. Thangaraj R, Pant M, Abraham A, Bouvry P. Particle swarm optimization: Hybridization perspectives and experimental illustrations. Applied Mathematics and Computation. 2011. pp. 5208–5226.
  55. 55. Eberhart R, Kennedy J. A new optimizer using particle swarm theory. MHS’95 Proc Sixth Int Symp Micro Mach Hum Sci. 1995; 39–43.
  56. 56. Mitchell M. An introduction to genetic algorithms. MIT Press; 1998.
  57. 57. Storn R, Price K. Differential evolution—a simple and efficient heuristic for global optimization over continuous spaces. J Glob Optim. 1997; 341–359.
  58. 58. Pooranian Z, Shojafar M, Abawajy JH, Abraham A. An efficient meta-heuristic algorithm for grid computing. J Comb Optim. 2015;30: 413–434.
  59. 59. Jiang HM, Kwong CK, Ip WH, Wong TC. Modeling customer satisfaction for new product development using a PSO-based ANFIS approach. Appl Soft Comput J. 2012;12: 726–734.
  60. 60. Catalao JPS, Pousinho HMI, Mendes VMF. Hybrid Wavelet-PSO-ANFIS Approach for Short-Term Electricity Prices Forecasting. IEEE Trans Power Syst. 2011;26: 137–144.
  61. 61. Basser H, Karami H, Shamshirband S, Akib S, Amirmojahedi M, Ahmad R, et al. Hybrid ANFIS-PSO approach for predicting optimum parameters of a protective spur dike. Appl Soft Comput J. 2015;30: 642–649.
  62. 62. Anubis. Anubis: Analyzing Unknown Binaries [Internet]. 2013 [cited 1 Dec 2014]. Available: http://anubis.iseclab.org/ 23888591
  63. 63. SandDroid. SandDroid: An Automatic Android Program Analysis Sandbox [Internet]. 2013 [cited 10 Dec 2014]. Available: http://sanddroid.xjtu.edu.cn/ 23888591
  64. 64. Tshark. tshark—The Wireshark Network Analyzer 1.12.0 [Internet]. 2013 [cited 21 Jan 2015]. Available: http://www.wireshark.org/docs/man-pages/tshark.html 23888591
  65. 65. Hall M, Frank E, Holmes G, Pfahringer B, Reutemann P, Witten IH. The WEKA Data Mining Software : An Update. SIGKDD Explor. 2009;11: 10–18.
  66. 66. Bashir ZA, El-Hawary ME. Applying wavelets to short-term load forecasting using PSO-based neural networks. IEEE Trans Power Syst. 2009;24: 20–27.
  67. 67. Yu W, Li X. Fuzzy identification using fuzzy neural networks with stable learning algorithms. IEEE Trans Fuzzy Syst. 2004;12: 411–420.
  68. 68. Yuan X, Wang L, Yuan Y. Application of enhanced PSO approach to optimal scheduling of hydro system. Energy Convers Manag. 2008;49: 2966–2972.
  69. 69. Kennedy J. The behavior of particle. In: Porto VW, Saravanan N, Waagen D, Eiben AE, editors. Evolutionary Programming VII. Springer Berlin Heidelberg; 1998. pp. 579–589. https://doi.org/10.1007/BFb0040809
  70. 70. Shoorehdeli MA, Teshnehlab M, Sedigh AK, Khanesar MA. Identification using ANFIS with intelligent hybrid stable learning algorithm approaches and stability analysis of training methods. Appl Soft Comput. 2009;9: 833–850.
  71. 71. Jang JSR. ANFIS: adaptive-network-based fuzzy inference system. IEEE Trans Syst Man Cybern. 1993;23: 665–685.
  72. 72. Takagi T, Sugeno M. Derivation of fuzzy control rules from human operator’s control actions. Proceedings of the IFAC symposium on fuzzy information, knowledge representation and decision analysis. 1983. p. Vol. 6, pp. 55–60.
  73. 73. Juang C. Combination of Particle Swarm and Ant Colony Optimization Algorithms for Fuzzy Systems Design. 2010;
  74. 74. Demšar J. Statistical Comparisons of Classifiers over Multiple Data Sets. J Mach Learn Res. 2006;7: 1–30.