End-to-end malware detection for android IoT devices using deep learning

作者: Zhongru Ren , Haomin Wu , Qian Ning , Iftikhar Hussain , Bingcai Chen

DOI: 10.1016/J.ADHOC.2020.102098

关键词:

摘要: Abstract The Internet of Things (IoT) has grown rapidly in recent years and become one the most active areas global market. As an open source platform with a large number users, Android driving force behind rapid development IoT, also attracted malware attacks. Considering explosive growth years, there is urgent need to propose efficient methods for detection. Although existing detection based on machine learning achieved encouraging performance, these require lot time effort from analysts build dynamic or static features, so are difficult apply practice. Therefore, end-to-end without human expert intervention required. This paper proposes two deep learning. Compared methods, proposed have advantage their process. Our resample raw bytecodes classes.dex files applications as input models. These models trained evaluated dataset containing 8K benign malicious applications. Experiments show that can achieve 93.4% 95.8% accuracy respectively. our not limited by filesize, no manual feature engineering, low resource consumption, they more suitable application IoT devices.

参考文章(39)
Borja Sanz, Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Pablo Garcia Bringas, Gonzalo Álvarez, PUMA: Permission Usage to Detect Malware in Android CISIS/ICEUTE/SOCO Special Sessions. pp. 289- 298 ,(2013) , 10.1007/978-3-642-33018-6_30
Yousra Aafer, Wenliang Du, Heng Yin, DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. pp. 86- 103 ,(2013) , 10.1007/978-3-319-04283-1_6
William Enck, Patrick McDaniel, Jaeyeon Jung, Byung-Gon Chun, Peter Gilbert, Anmol N. Sheth, Landon P. Cox, TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones operating systems design and implementation. pp. 393- 407 ,(2010) , 10.5555/1924943.1924971
William Enck, Machigar Ongtang, Patrick McDaniel, On lightweight mobile phone application certification computer and communications security. pp. 235- 245 ,(2009) , 10.1145/1653662.1653691
L. Nataraj, S. Karthikeyan, G. Jacob, B. S. Manjunath, Malware images: visualization and automatic classification visualization for computer security. pp. 4- ,(2011) , 10.1145/2016904.2016908
Riyadh Mahmood, Nariman Mirzaei, Sam Malek, EvoDroid: segmented evolutionary testing of Android apps foundations of software engineering. pp. 599- 609 ,(2014) , 10.1145/2635868.2635896
Timothy Vidas, Jiaqi Tan, Jay Nahata, Chaur Lih Tan, Nicolas Christin, Patrick Tague, A5: Automated Analysis of Adversarial Android Applications security and privacy in smartphones and mobile devices. pp. 39- 50 ,(2014) , 10.1145/2666620.2666630
Vaibhav Rastogi, Yan Chen, Xuxian Jiang, Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks IEEE Transactions on Information Forensics and Security. ,vol. 9, pp. 99- 108 ,(2014) , 10.1109/TIFS.2013.2290431
Michael Spreitzenbarth, Felix Freiling, Florian Echtler, Thomas Schreck, Johannes Hoffmann, Mobile-sandbox: having a deeper look into android applications acm symposium on applied computing. pp. 1808- 1815 ,(2013) , 10.1145/2480362.2480701