DecaDroid Classification and Characterization of Malicious Behaviour in Android Applications

被引:1
|
作者
Gupta, Charu [1 ]
Singh, Rakesh Kumar [2 ]
Bhatia, Simran Kaur [1 ]
Mohapatra, Amar Kumar [1 ]
机构
[1] Indira Gandhi Delhi Tech Univ Women, Delhi, India
[2] Indira Gandhi Delhi Tech Univ Women, Dept Informat Technol, Delhi, India
关键词
Android Malware; Data Flow Analysis; Data Leakage; Gradient Boosting Tree; Malware Families; Smartphones; Source-Sink Pair; Static Analysis; MALWARE DETECTION;
D O I
10.4018/IJISP.2020100104
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Widespread use of Android-based applications on the smartphones has resulted in significant growth of security attack incidents. Malware-based attacks are the most common attacks on Android-based smartphones. To forestall malware from attacking the users, a much better understanding of Android malware and its behaviour is required. In this article, an approach to classify and characterise the malicious behaviour of Android applications using static features, data flow analysis, and machine learning techniques has been proposed. Static features like hardware components, permissions, Android components and inter-component communication along with unique source-sink pairs obtained from data flow analysis have been used to extract the features of the Android applications. Based on the features extracted, the malicious behaviour of the applications has been classified to their respective malware family. The proposed approach has given 95.19% accuracy rate and F1 measure of 92.19302 with the largest number of malware families classified as compared to previous work.
引用
收藏
页码:57 / 73
页数:17
相关论文
共 50 条
  • [31] Detecting Applications with Malicious Behavior in Android Device Based on GA and SVM
    Liu, Ning
    Yang, Min
    Zhang, Shibin
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL AND AUTOMATION ENGINEERING (ECAE 2017), 2017, 140 : 257 - 261
  • [32] A Software Environment for Confining Malicious Android Applications via Resource Virtualization
    Li, Xiaolei
    Bai, Guangdong
    Liang, Zhenkai
    Yin, Heng
    2013 18TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS), 2013, : 208 - 211
  • [33] Analyzing HTTP-Based Information Exfiltration of Malicious Android Applications
    Kelkar, Soham
    Kraus, Timothy
    Morgan, Daria
    Zhang, Junjie
    Dai, Rui
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1642 - 1645
  • [34] Assessment of malicious applications using permissions and enhanced user interfaces on Android
    Lee, Sangho
    Ju, Da Young
    2013 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: BIG DATA, EMERGENT THREATS, AND DECISION-MAKING IN SECURITY INFORMATICS, 2013, : 270 - 270
  • [35] Applying Natural Language Processing for detecting malicious patterns in Android applications
    Alam, Shahid
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2021, 39
  • [36] Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications
    Poeplau, Sebastian
    Fratantonio, Yanick
    Bianchi, Antonio
    Kruegel, Christopher
    Vigna, Giovanni
    21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [37] Intelligent identification of malicious behavior in Android applications based on Naive Bayes
    Zhang, Yiting
    Zhang, Yang
    Zhang, Tao
    Yang, Ming
    Luo, Junzhou
    Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2015, 45 (02): : 224 - 230
  • [38] R&R Tool for Android Applications Hiding Malicious Features
    Lee, Jusuk
    Kim, Ajung
    Lee, Sumin
    Hong, Jiman
    37TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2022, : 1190 - 1196
  • [39] Constructing Features for Detecting Android Malicious Applications: Issues, Taxonomy and Directions
    Wang, Wei
    Zhao, Meichen
    Gao, Zhenzhen
    Xu, Guangquan
    Xian, Hequn
    Li, Yuanyuan
    Zhang, Xiangliang
    IEEE ACCESS, 2019, 7 : 67602 - 67631
  • [40] Discovering Persuaded Risk of Permission in Android Applications for Malicious Application Detection
    Singh, Pooja
    Singh, Santosh
    Tiwari, Pankaj
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 922 - 926