CorrNetDroid: Android Malware Detector leveraging a Correlation-based Feature Selection for Network Traffic features

📅 2025-03-03
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Static Android malware analysis is often evaded by obfuscation and packing techniques, resulting in insufficient robustness. To address this, this paper proposes a lightweight dynamic Android malware detection method based on network traffic behavioral modeling. Its core innovation lies in a dual-correlation feature selection algorithm—NMRS combined with crRelevance—that jointly models both feature-to-class and feature-to-feature correlations for the first time, enabling optimal selection of a minimal discriminative feature subset. Relying solely on two statistical network traffic features—e.g., DNS query frequency and HTTP User-Agent entropy—the method achieves 99.50% detection accuracy on standard benchmarks, significantly outperforming conventional approaches including chi-square tests, ANOVA, and state-of-the-art dynamic detectors. The approach thus delivers high accuracy, low computational overhead, and strong generalization capability.

Technology Category

Application Category

📝 Abstract
Copious mobile operating systems exist in the market, but Android remains the user's choice. Meanwhile, its growing popularity has also attracted malware developers. Researchers have proposed various static solutions for Android malware detection. However, stealthier malware evade static analysis. This raises the need for a robust Android malware detection system capable of dealing with advanced threats and overcoming the shortcomings of static analysis. Hence, this work proposes a dynamic analysis-based Android malware detection system, CorrNetDroid, that works over network traffic flows. Many traffic features exhibit overlapping ranges in normal and malware datasets. Therefore, we first rank the features using two statistical measures, crRelevance and Normalized Mean Residue Similarity (NMRS), to assess feature-class and feature-feature correlations. Thereafter, we introduce a novel correlation-based feature selection algorithm that applies NMRS on crRelevance rankings to identify the optimal feature subset for Android malware detection. Experimental results highlight that our model effectively reduces the feature set while detecting Android malware with 99.50 percent accuracy when considering only two network traffic features. Furthermore, our experiments demonstrate that the NMRS-based algorithm on crRelevance rankings outperforms statistical tests such as chi-square, ANOVA, Mann-Whitney U test, and Kruskal-Wallis test. In addition, our model surpasses various state-of-the-art Android malware detection techniques in terms of detection accuracy.
Problem

Research questions and friction points this paper is trying to address.

Detects Android malware using network traffic analysis
Overcomes limitations of static analysis methods
Selects optimal features via correlation-based algorithms
Innovation

Methods, ideas, or system contributions that make the work stand out.

Dynamic analysis for Android malware detection
Correlation-based feature selection algorithm
High accuracy with minimal network features
Y
Yash Sharma
Department of Applied Mathematics, Delhi Technological University, Delhi -110042, India
Anshul Arora
Anshul Arora
Assistant Professor at Delhi Technological University
Android SecurityMalware DetectionMachine LearningBlockchain