Evaluating Convolutional Neural Network for Effective Mobile Malware Detection

作者: Fabio Martinelli , Fiammetta Marulli , Francesco Mercaldo

DOI: 10.1016/J.PROCS.2017.08.216

关键词:

摘要: In last years smartphone and tablet devices have been handling an increasing variety of sensitive resources. As a matter fact, these store plethora information related to our every-day life, from the contact list, received email, also position during day (using not only GPS chipset that can be disabled but Wi-Fi/mobile connection it is possible discover device geolocalization).This reason why mobile attackers are producing large number malicious applications targeting Android (that most diffused operating system), often by modifying existing applications, which results in malware being organized families, where each application belonging same family exhibit behaviour. These behaviours typically gathering related, for instance very widespread behaviour represented sending personal (as examples: send SMSs, browser history) remote server managed attackers.In this paper, we investigate whether deep learning algorithms able discriminate between legitimate samples. To end, designed method based on convolutional neural network applied syscalls occurrences through dynamic analysis. We experimentally evaluated built classifiers recent dataset composed 7100 real-world more than 3000 several different families order test effectiveness proposed method, obtaining encouraging results.

参考文章(25)
Gerardo Canfora, Eric Medvet, Francesco Mercaldo, Corrado Aaron Visaggio, Detection of Malicious Web Pages Using System Calls Sequences Advanced Information Systems Engineering. ,vol. 8708, pp. 226- 238 ,(2014) , 10.1007/978-3-319-10975-6_17
Ling Liu, MT Özsu, Editors, 871 authors, 5 chapters by, Lie Lu, Alan Hanjalic, Encyclopedia of Database Systems Springer US. ,(2009) , 10.1007/978-0-387-39940-9
Yoon Kim, Convolutional Neural Networks for Sentence Classification empirical methods in natural language processing. pp. 1746- 1751 ,(2014) , 10.3115/V1/D14-1181
Claudio Marforio, Srdjan Capkun, Aurélien Francillon, Application Collusion Attack on the Permission-Based Security Model and its Implications for Modern Smartphone Systems CTIT technical reports series. ,vol. 724, ,(2010) , 10.3929/ETHZ-A-006936208
Flora Amato, Giuseppe De Pietro, Massimo Esposito, Nicola Mazzocca, An integrated framework for securing semi-structured health records Knowledge Based Systems. ,vol. 79, pp. 99- 117 ,(2015) , 10.1016/J.KNOSYS.2015.02.004
Tom M Mitchell, None, Machine learning and data mining Communications of The ACM. ,vol. 42, pp. 30- 36 ,(1999) , 10.1145/319382.319388
Youn-sik Jeong, Hwan-taek Lee, Seong-je Cho, Sangchul Han, Minkyu Park, A kernel-based monitoring approach for analyzing malicious behavior on Android acm symposium on applied computing. pp. 1737- 1738 ,(2014) , 10.1145/2554850.2559915
Thomas Bläsing, Leonid Batyuk, Aubrey-Derrick Schmidt, Seyit Ahmet Camtepe, Sahin Albayrak, An Android Application Sandbox system for suspicious software detection international conference on malicious and unwanted software. pp. 55- 62 ,(2010) , 10.1109/MALWARE.2010.5665792
Takamasa Isohara, Keisuke Takemori, Ayumu Kubota, Kernel-based Behavior Analysis for Android Malware Detection computational intelligence and security. pp. 1011- 1015 ,(2011) , 10.1109/CIS.2011.226
Hahnsang Kim, Joshua Smith, Kang G. Shin, Detecting energy-greedy anomalies and mobile malware variants Proceeding of the 6th international conference on Mobile systems, applications, and services - MobiSys '08. pp. 239- 252 ,(2008) , 10.1145/1378600.1378627