A hybrid approach of mobile malware detection in Android

作者: Fei Tong , Zheng Yan

DOI: 10.1016/J.JPDC.2016.10.012

关键词: Computer scienceMobile malwareAccess networkOperating systemMalwareData miningSystem callAndroid (operating system)Static analysis

摘要: Android security incidents occurred frequently in recent years. This motivates us to study mobile app security, especially open operating system. In this paper, we propose a novel hybrid approach for malware detection by adopting both dynamic analysis and static analysis. We collect execution data of sample benign apps using net_link technology generate patterns system calls related file network access. Furthermore, build up malicious pattern set normal comparing the with each other. For detecting an unknown app, use method its calling data. then compare them sets offline order judge app. Based on test apps, found that our achieves better success rate than some methods either or What is more, proposed generic, which can detect different types effectively. Its accuracy be further improved since automatically optimized through self-learning. Hybrid based patterns.Implementation performance platform.Self-improvement automatic optimization sets.Detection generality showed comparison.

参考文章(29)
Damien Octeau, William Enck, Patrick McDaniel, Swarat Chaudhuri, A study of android application security usenix security symposium. pp. 21- 21 ,(2011)
Adrienne Porter Felt, Kate Greenwood, David Wagner, The effectiveness of application permissions usenix conference on web application development. pp. 7- 7 ,(2011)
Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna, PiOS : Detecting privacy leaks in iOS applications network and distributed system security symposium. ,(2011)
Qi Li, Xiaoyu Li, Android Malware Detection Based on Static Analysis of Characteristic Tree 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery. pp. 84- 91 ,(2015) , 10.1109/CYBERC.2015.88
William Enck, Patrick McDaniel, Jaeyeon Jung, Byung-Gon Chun, Peter Gilbert, Anmol N. Sheth, Landon P. Cox, TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones operating systems design and implementation. pp. 393- 407 ,(2010) , 10.5555/1924943.1924971
Suleiman Y. Yerima, Gavin McWilliams, Sakir Sezer, Analysis of Bayesian classification-based approaches for Android malware detection Iet Information Security. ,vol. 8, pp. 25- 36 ,(2014) , 10.1049/IET-IFS.2013.0095
David Barrera, H. G üne ş Kayacik, Paul C. van Oorschot, Anil Somayaji, A methodology for empirical analysis of permission-based security models and its application to android Proceedings of the 17th ACM conference on Computer and communications security - CCS '10. pp. 73- 84 ,(2010) , 10.1145/1866307.1866317
Tong Shen, Yibing Zhongyang, Zhi Xin, Bing Mao, Hao Huang, Detect Android Malware Variants Using Component Based Topology Graph trust security and privacy in computing and communications. pp. 406- 413 ,(2014) , 10.1109/TRUSTCOM.2014.52
Thomas Bläsing, Leonid Batyuk, Aubrey-Derrick Schmidt, Seyit Ahmet Camtepe, Sahin Albayrak, An Android Application Sandbox system for suspicious software detection international conference on malicious and unwanted software. pp. 55- 62 ,(2010) , 10.1109/MALWARE.2010.5665792
William Enck, Machigar Ongtang, Patrick McDaniel, On lightweight mobile phone application certification computer and communications security. pp. 235- 245 ,(2009) , 10.1145/1653662.1653691