Andromaly: a behavioral malware detection framework for android devices

作者: Asaf Shabtai , Uri Kanonov , Yuval Elovici , Chanan Glezer , Yael Weiss

DOI: 10.1007/S10844-010-0148-X

关键词:

摘要: This article presents Andromaly--a framework for detecting malware on Android mobile devices. The proposed realizes a Host-based Malware Detection System that continuously monitors various features and events obtained from the device then applies Machine Learning anomaly detectors to classify collected data as normal (benign) or abnormal (malicious). Since no malicious applications are yet available Android, we developed four applications, evaluated Andromaly's ability detect new based samples of known malware. We several combinations detection algorithms, feature selection method number top in order find combination yields best performance Android. Empirical results suggest is effective devices general particular.

参考文章(60)
Peter Burge, Yves Moreau, Bart Preneel, John Shawe-Taylor, Novel Techniques for Fraud Detection in Mobile Telecommunication Networks ,(2007)
Sahin Albayrak, Seyit Camtepe, Jan Clausen, Aubrey-Derrick Schmidt, Kamer Ail Yuksel, Hans-Gunterh Schmidt, Kiraz Osman, Enhancing security of linux-based android devices School of Electrical Engineering & Computer Science; Information Security Institute; Science & Engineering Faculty. ,(2008)
Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick Düssel, Pavel Laskov, Learning and Classification of Malware Behavior international conference on detection of intrusions and malware and vulnerability assessment. pp. 108- 125 ,(2008) , 10.1007/978-3-540-70542-0_6
Y Elovici, S Dolev, A Shabtai, U Kanonov, Y Fledel, Google Android: A State-of-the-Art Review of Security Mechanisms arXiv: Cryptography and Security. ,(2009)
Kent Griffin, Scott Schneider, Xin Hu, Tzi-cker Chiueh, Automatic Generation of String Signatures for Malware Detection recent advances in intrusion detection. pp. 101- 120 ,(2009) , 10.1007/978-3-642-04342-0_6
Wenwu Zhu, Helen J. Wang, Chuanxiong Guo, Smart-Phone Attacks and Defenses ,(2004)
D. Endler, Intrusion detection. Applying machine learning to Solaris audit data annual computer security applications conference. pp. 268- 279 ,(1998) , 10.1109/CSAC.1998.738647
Teck Sung Yap, Hong Tat Ewe, A Mobile Phone Malicious Software Detection Model with Behavior Checker Lecture Notes in Computer Science. pp. 57- 65 ,(2005) , 10.1007/11527725_7
Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. Stolfo, Erez Zadok, Toward cost-sensitive modeling for intrusion detection and response Journal of Computer Security. ,vol. 10, pp. 5- 22 ,(2002) , 10.3233/JCS-2002-101-202
Wenke Lee, S.J. Stolfo, K.W. Mok, A data mining framework for building intrusion detection models ieee symposium on security and privacy. pp. 120- 132 ,(1999) , 10.1109/SECPRI.1999.766909