Malware Detection in Android files based on Multiple levels of Learning and Diverse Data Sources

作者: Shina Sheen , Anitha Ramalingam

DOI: 10.1145/2791405.2791417

关键词: Embedded systemMalwareHigh rateAndroid (operating system)Ubiquitous computingOperating systemMobile deviceComputer science

摘要: Smart mobile device usage has expanded at a very high rate all over the world. Mobile devices have experienced rapid shift from pure telecommunication to small ubiquitous computing platforms. They run sophisticated operating systems that need confront same risks as desktop computers, with Android most targeted platform for malware. The processing power is one of factors differentiate PC's and phones. phones are more compact therefore limited in memory depend on battery their energy needs. Hence developing apps these should take into consideration above mentioned factors. To improve speed detection, multilevel detection mechanism using diverse data sources designed detecting malware balancing between accuracy less compute intensive computations. In this work we analyzed android based analysis sources. We evaluated our collection comprising different families results show proposed method faster good performance

参考文章(16)
Gianluca Dini, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra, MADAM: A Multi-level Anomaly Detector for Android Malware Lecture Notes in Computer Science. pp. 240- 253 ,(2012) , 10.1007/978-3-642-33704-8_21
Ethem Alpaydin, Cenk Kaynak, MultiStage Cascading of Multiple Classifiers: One Man's Noise is Another Man's Data international conference on machine learning. pp. 455- 462 ,(2000)
Borja Sanz, Igor Santos, Xabier Ugarte-Pedrero, Carlos Laorden, Javier Nieves, Pablo García Bringas, Anomaly Detection using String Analysis for Android Malware Detection soco-cisis-iceute. pp. 469- 478 ,(2014) , 10.1007/978-3-319-01854-6_48
Kenji Kira, Larry A. Rendell, The feature selection problem: traditional methods and a new algorithm national conference on artificial intelligence. pp. 129- 134 ,(1992)
Wei Xu, Fangfang Zhang, Sencun Zhu, Permlyzer: Analyzing permission usage in Android applications international symposium on software reliability engineering. pp. 400- 410 ,(2013) , 10.1109/ISSRE.2013.6698893
S. Charles Brubaker, Jianxin Wu, Jie Sun, Matthew D. Mullin, James M. Rehg, On the Design of Cascades of Boosted Ensembles for Face Detection International Journal of Computer Vision. ,vol. 77, pp. 65- 86 ,(2008) , 10.1007/S11263-007-0060-1
Veelasha Moonsamy, Jia Rong, Shaowu Liu, Mining permission patterns for contrasting clean and malicious android applications Future Generation Computer Systems. ,vol. 36, pp. 122- 132 ,(2014) , 10.1016/J.FUTURE.2013.09.014
Vikas C. Raykar, Balaji Krishnapuram, Shipeng Yu, Designing efficient cascaded classifiers: tradeoff between accuracy and cost knowledge discovery and data mining. pp. 853- 860 ,(2010) , 10.1145/1835804.1835912
Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David Wagner, Android permissions demystified Proceedings of the 18th ACM conference on Computer and communications security - CCS '11. pp. 627- 638 ,(2011) , 10.1145/2046707.2046779
Hamed Masnadi-Shirazi, Nuno Vasconcelos, High Detection-rate Cascades for Real-Time Object Detection international conference on computer vision. pp. 1- 6 ,(2007) , 10.1109/ICCV.2007.4408860