An Android Malware Detection Approach Using Community Structures of Weighted Function Call Graphs

作者: Yao Du , Junfeng Wang , Qi Li , None

DOI: 10.1109/ACCESS.2017.2720160

关键词:

摘要: With the development of code obfuscation and application repackaging technologies, an increasing number structural information-based methods have been proposed for malware detection. Although, many offer improved detection accuracy via a similarity comparison specific graphs, they still face limitations in terms computation time need manual operation. In this paper, we present new method that automatically divides function call graph into community structures. The features these structures can then be used to detect malware. Our reduces by improving Girvan–Newman algorithm using machine learning classification instead subgraphs. To evaluate our method, 5040 samples 8750 benign were collected as experimental data set. evaluation results show is higher than three well-known anti-virus software two previous control flow graph-based families. runtime performance exhibits clear improvement over GN structure generation.

参考文章(29)
Dan Caselden, Alex Bazhanyuk, Mathias Payer, Stephen McCamant, Dawn Song, HI-CFG: Construction by Binary Analysis and Application to Attack Polymorphism european symposium on research in computer security. pp. 164- 181 ,(2013) , 10.1007/978-3-642-40203-6_10
Jonathan Crussell, Clint Gibler, Hao Chen, Attack of the Clones: Detecting Cloned Applications on Android Markets Computer Security – ESORICS 2012. pp. 37- 54 ,(2012) , 10.1007/978-3-642-33167-1_3
Martina Lindorfer, Matthias Neugschwandtner, Christian Platzer, None, MARVIN: Efficient and Comprehensive Mobile App Classification through Static and Dynamic Analysis computer software and applications conference. ,vol. 2, pp. 422- 433 ,(2015) , 10.1109/COMPSAC.2015.103
William Enck, Patrick McDaniel, Jaeyeon Jung, Byung-Gon Chun, Peter Gilbert, Anmol N. Sheth, Landon P. Cox, TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones operating systems design and implementation. pp. 393- 407 ,(2010) , 10.5555/1924943.1924971
Jonghoon Kwon, Jihwan Jeong, Jehyun Lee, Heejo Lee, DroidGraph: Discovering Android malware by analyzing semantic behavior communications and networking symposium. pp. 498- 499 ,(2014) , 10.1109/CNS.2014.6997523
Yao Du, Xiaoqing Wang, Junfeng Wang, A static Android malicious code detection method based on multi-source fusion Security and Communication Networks. ,vol. 8, pp. 3238- 3246 ,(2015) , 10.1002/SEC.1248
M. Girvan, M. E. J. Newman, Community structure in social and biological networks Proceedings of the National Academy of Sciences of the United States of America. ,vol. 99, pp. 7821- 7826 ,(2002) , 10.1073/PNAS.122653799
Xu-Yang Ding, Huan Zeng, Yan Ren, Qing-Xian Wang, Neng-Qiang He, Detecting malware and evaluating risk of app using Android permission-API system active media technology. pp. 440- 443 ,(2014) , 10.1109/ICCWAMTIP.2014.7073445
Tong Shen, Yibing Zhongyang, Zhi Xin, Bing Mao, Hao Huang, Detect Android Malware Variants Using Component Based Topology Graph trust security and privacy in computing and communications. pp. 406- 413 ,(2014) , 10.1109/TRUSTCOM.2014.52
Fabian Yamaguchi, Nico Golde, Daniel Arp, Konrad Rieck, Modeling and Discovering Vulnerabilities with Code Property Graphs ieee symposium on security and privacy. pp. 590- 604 ,(2014) , 10.1109/SP.2014.44