Analysis of Bayesian classification-based approaches for Android malware detection

作者: Suleiman Y. Yerima , Gavin McWilliams , Sakir Sezer

DOI: 10.1049/IET-IFS.2013.0095

关键词:

摘要: Mobile malware has been growing in scale and complexity spurred by the unabated uptake of smartphones worldwide. Android is fast becoming most popular mobile platform resulting sharp increase targeting platform. Additionally, evolving rapidly to evade detection traditional signature-based scanning. Despite current measures place, timely discovery new still a critical issue. This calls for novel approaches mitigate threat zero-day malware. Hence, authors develop analyse proactive machine-learning based on Bayesian classification aimed at uncovering unknown via static analysis. The study, which large sample set majority existing families, demonstrates capabilities with high accuracy. Empirical results comparative analysis are presented offering useful insight towards development effective static-analytic classification-based solutions detecting

参考文章(25)
Borja Sanz, Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Pablo Garcia Bringas, Gonzalo Álvarez, PUMA: Permission Usage to Detect Malware in Android CISIS/ICEUTE/SOCO Special Sessions. pp. 289- 298 ,(2013) , 10.1007/978-3-642-33018-6_30
Farnam Jahanian, Jon Oberheide, Evan Cooke, CloudAV: N-version antivirus in the network cloud usenix security symposium. pp. 91- 106 ,(2008)
Clint Gibler, Jonathan Crussell, Jeremy Erickson, Hao Chen, AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale trust and trustworthy computing. pp. 291- 307 ,(2012) , 10.1007/978-3-642-30921-2_17
Christopher Mann, Artem Starostin, A framework for static detection of privacy leaks in android applications acm symposium on applied computing. pp. 1457- 1462 ,(2012) , 10.1145/2245276.2232009
Leonid Batyuk, Markus Herpich, Seyit Ahmet Camtepe, Karsten Raddatz, Aubrey-Derrick Schmidt, Sahin Albayrak, Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications international conference on malicious and unwanted software. pp. 66- 72 ,(2011) , 10.1109/MALWARE.2011.6112328
Iker Burguera, Urko Zurutuza, Simin Nadjm-Tehrani, Crowdroid Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '11. pp. 15- 26 ,(2011) , 10.1145/2046614.2046619
Erika Chin, Adrienne Porter Felt, Kate Greenwood, David Wagner, Analyzing inter-application communication in Android Proceedings of the 9th international conference on Mobile systems, applications, and services - MobiSys '11. pp. 239- 252 ,(2011) , 10.1145/1999995.2000018
Thomas Bläsing, Leonid Batyuk, Aubrey-Derrick Schmidt, Seyit Ahmet Camtepe, Sahin Albayrak, An Android Application Sandbox system for suspicious software detection international conference on malicious and unwanted software. pp. 55- 62 ,(2010) , 10.1109/MALWARE.2010.5665792
Axelle Apvrille, Tim Strazzere, Reducing the window of opportunity for Android malware Gotta catch 'em all Journal of Computer Virology and Hacking Techniques. ,vol. 8, pp. 61- 71 ,(2012) , 10.1007/S11416-012-0162-3
William Enck, Machigar Ongtang, Patrick McDaniel, On lightweight mobile phone application certification computer and communications security. pp. 235- 245 ,(2009) , 10.1145/1653662.1653691