Machine Learning-Based Malware Detection for Android Applications: History Matters!

作者: Kevin Allix , Yves Le Traon , Tegawendé François D Assise Bissyande , Jacques Klein

DOI:

关键词:

摘要: Machine Learning-based malware detection is a promising scalable method for identifying suspicious applications. In particular, in today’s mobile computing realm where thousands of applications are daily poured into markets, such technique could be valuable to guarantee strong filtering malicious apps. The success machine-learning approaches however highly dependent on (1) the quality datasets that used training and (2) appropriateness tested with regards built classifiers. Unfortunately, there scarce mention these aspects evaluation existing state-of-the-art literature. this paper, we consider relevance history construction datasets, highlight its impact performance scheme. Typically, show simply picking random set known train detector, as it done most assessment scenarios from literature, yields significantly biased results. process assessing extent through various experiments, were also able confirm number intuitive assumptions about Android malware. For instance, discuss existence lineages how they wild.

参考文章(39)
Yuval Shahar, Lior Rokach, Gil Tahan, Mal-ID: automatic malware detection using common segment analysis and meta-features Journal of Machine Learning Research. ,vol. 13, pp. 949- 979 ,(2012)
Duen Horng Chau, Carey Nachenberg, Christos Faloutsos, Adam Wright, Jeffrey Wilhelm, Polonium: Tera-Scale Graph Mining for Malware Detection ,(2013)
Damien Octeau, William Enck, Patrick McDaniel, Swarat Chaudhuri, A study of android application security usenix security symposium. pp. 21- 21 ,(2011)
Silvio Cesare, Yang Xiang, Classification of malware using structured control flow AusPDC '10 Proceedings of the Eighth Australasian Symposium on Parallel and Distributed Computing - Volume 107. pp. 61- 70 ,(2010)
Igor Santos, Yoseba K Penya, Jaime Devesa, Pablo G Bringas, None, N-GRAMS-BASED FILE SIGNATURES FOR MALWARE DETECTION Proceedings of the 11th International Conference on Enterprise Information. pp. 317- 320 ,(2009) , 10.5220/0001863603170320
Aditya P. Mathur, Nwokedi Idika, A Survey of Malware Detection Techniques ,(2007)
J. O. Kephart, A biologically inspired immune system for computers Artificial Life. ,(1994)
Boyun Zhang, Jianping Yin, Jingbo Hao, Dingxing Zhang, Shulin Wang, Malicious codes detection based on ensemble learning autonomic and trusted computing. pp. 468- 477 ,(2007) , 10.1007/978-3-540-73547-2_48
William W. Cohen, Fast Effective Rule Induction Machine Learning Proceedings 1995. pp. 115- 123 ,(1995) , 10.1016/B978-1-55860-377-6.50023-2
Yousra Aafer, Wenliang Du, Heng Yin, DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. pp. 86- 103 ,(2013) , 10.1007/978-3-319-04283-1_6