Topic Model Based Android Malware Detection

作者: Yucai Song , Yang Chen , Bo Lang , Hongyu Liu , Shaojie Chen

DOI: 10.1007/978-3-030-24907-6_29

关键词: Android (operating system)Information retrievalSemantic featureText documentMalwareTopic modelAndroid malwareComputer scienceFeature extractionSource code

摘要: Nowadays, the security risks brought by Android malwares are increasing. Machine learning is considered as a potential solution for promoting performance of malware detection. For machine based detection, feature extraction plays key role. Thinking source codes applications comparable with text documents, we propose new detection method on topic model which an effective technique in extraction. Our regards decompiled application document, and used to mine topics can reflect semantic application. The experimental results demonstrate that, our approach performs better than state-of-the-art methods. Also, mines features files automatically without manually design, therefore overcomes limitation present methods relies experts’ prior knowledge.

参考文章(25)
Chao Yang, Zhaoyan Xu, Guofei Gu, Vinod Yegneswaran, Phillip Porras, DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications european symposium on research in computer security. pp. 163- 182 ,(2014) , 10.1007/978-3-319-11203-9_10
Yousra Aafer, Wenliang Du, Heng Yin, DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. pp. 86- 103 ,(2013) , 10.1007/978-3-319-04283-1_6
Gerard Salton, Christopher Buckley, Term Weighting Approaches in Automatic Text Retrieval Information Processing and Management. ,vol. 24, pp. 323- 328 ,(1988) , 10.1016/0306-4573(88)90021-0
A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev, C. Glezer, Google Android: A Comprehensive Security Assessment ieee symposium on security and privacy. ,vol. 8, pp. 35- 44 ,(2010) , 10.1109/MSP.2010.2
Lei Cen, Christoher S. Gates, Luo Si, Ninghui Li, A Probabilistic Discriminative Model for Android Malware Detection with Decompiled Source Code IEEE Transactions on Dependable and Secure Computing. ,vol. 12, pp. 400- 412 ,(2015) , 10.1109/TDSC.2014.2355839
Zhibo Zhao, Fernando C. Colon Osono, “TrustDroid™”: Preventing the use of SmartPhones for information leaking in corporate networks through the used of static analysis taint tracking international conference on malicious and unwanted software. pp. 135- 143 ,(2012) , 10.1109/MALWARE.2012.6461017
Wei Wang, Xing Wang, Dawei Feng, Jiqiang Liu, Zhen Han, Xiangliang Zhang, Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection IEEE Transactions on Information Forensics and Security. ,vol. 9, pp. 1869- 1882 ,(2014) , 10.1109/TIFS.2014.2353996
Rong-En Fan, Kai-Wei Chang, Cho-Jui Hsieh, Chih-Jen Lin, Xiang-Rui Wang, LIBLINEAR: A Library for Large Linear Classification Journal of Machine Learning Research. ,vol. 9, pp. 1871- 1874 ,(2008)
Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, Konrad Rieck, CERT Siemens, DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket. network and distributed system security symposium. ,(2014) , 10.14722/NDSS.2014.23247
Scott Deerwester, Susan T. Dumais, George W. Furnas, Thomas K. Landauer, Richard Harshman, Indexing by Latent Semantic Analysis Journal of the Association for Information Science and Technology. ,vol. 41, pp. 391- 407 ,(1990) , 10.1002/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9