Android application classification and anomaly detection with graph-based permission patterns

作者: Karina Sokolova , Charles Perez , Marc Lemercier

DOI: 10.1016/J.DSS.2016.09.006

关键词:

摘要: Android is one of the mobile market leaders, offering more than a million applications on Google Play store. checks application for known malware, but abusively collecting users' data and requiring access to sensitive services not related functionalities are still present market. A permission system user-centric security solution against abusive malware that has been unsuccessful: users incapable understanding judging permissions required by each often ignore on-installation warnings. State-of-the-art shows current inappropriate end-users. However, lists do provide information about application's behavior may be suitable automatic analysis. Identifying key expected requests can help leverage abnormal simpler risk warning users. Applications with similar grouped into categories this work therefore analyzes category.In study, we propose methodology characterize normal category applications, highlighting requests. The co-required modeled as graph patterns central obtained using analysis metrics. evaluated performance classification allow choosing best metrics representing categories. Finally, study proposes privacy score threshold based efficiency proposed was tested set 9512 collected from malware. Display Omitted We build usage graph.We classify graph-analysis features.Among metrics, betweenness centrality weighted degree performed classification.We pattern-based metric applications.The showed high detection.

参考文章(41)
Serge Egelman, Adrienne Porter Felt, David Wagner, Choice Architecture and Smartphone Privacy: There’s a Price for That The Economics of Information Security and Privacy. pp. 211- 236 ,(2013) , 10.1007/978-3-642-39498-0_10
Tao Xie, Rahul Pandita, William Enck, Xusheng Xiao, Wei Yang, WHYPER: towards automating risk assessment of mobile applications usenix security symposium. pp. 527- 542 ,(2013)
Clint Gibler, Jonathan Crussell, Jeremy Erickson, Hao Chen, AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale trust and trustworthy computing. pp. 291- 307 ,(2012) , 10.1007/978-3-642-30921-2_17
Veelasha Moonsamy, Jia Rong, Shaowu Liu, Gang Li, Lynn Batten, Contrasting Permission Patterns between Clean and Malicious Android Applications Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. pp. 69- 85 ,(2013) , 10.1007/978-3-319-04283-1_5
Rajeev Motwani, Terry Winograd, Lawrence Page, Sergey Brin, The PageRank Citation Ranking : Bringing Order to the Web the web conference. ,vol. 98, pp. 161- 172 ,(1999)
Borja Sanz, Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Javier Nieves, Pablo G Bringas, Gonzalo Álvarez Marañón, None, MAMA: MANIFEST ANALYSIS FOR MALWARE DETECTION IN ANDROID Cybernetics and Systems. ,vol. 44, pp. 469- 488 ,(2013) , 10.1080/01969722.2013.803889
William Enck, Patrick McDaniel, Jaeyeon Jung, Byung-Gon Chun, Peter Gilbert, Anmol N. Sheth, Landon P. Cox, TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones operating systems design and implementation. pp. 393- 407 ,(2010) , 10.5555/1924943.1924971
Wei Xu, Fangfang Zhang, Sencun Zhu, Permlyzer: Analyzing permission usage in Android applications international symposium on software reliability engineering. pp. 400- 410 ,(2013) , 10.1109/ISSRE.2013.6698893
Rainer Böhme, Stefan Köpsell, Trained to accept? Proceedings of the 28th international conference on Human factors in computing systems - CHI '10. pp. 2403- 2406 ,(2010) , 10.1145/1753326.1753689
David Barrera, H. G üne ş Kayacik, Paul C. van Oorschot, Anil Somayaji, A methodology for empirical analysis of permission-based security models and its application to android Proceedings of the 17th ACM conference on Computer and communications security - CCS '10. pp. 73- 84 ,(2010) , 10.1145/1866307.1866317