DecaDroid Classification and Characterization of Malicious Behaviour in Android Applications

被引:1
|
作者
Gupta, Charu [1 ]
Singh, Rakesh Kumar [2 ]
Bhatia, Simran Kaur [1 ]
Mohapatra, Amar Kumar [1 ]
机构
[1] Indira Gandhi Delhi Tech Univ Women, Delhi, India
[2] Indira Gandhi Delhi Tech Univ Women, Dept Informat Technol, Delhi, India
关键词
Android Malware; Data Flow Analysis; Data Leakage; Gradient Boosting Tree; Malware Families; Smartphones; Source-Sink Pair; Static Analysis; MALWARE DETECTION;
D O I
10.4018/IJISP.2020100104
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Widespread use of Android-based applications on the smartphones has resulted in significant growth of security attack incidents. Malware-based attacks are the most common attacks on Android-based smartphones. To forestall malware from attacking the users, a much better understanding of Android malware and its behaviour is required. In this article, an approach to classify and characterise the malicious behaviour of Android applications using static features, data flow analysis, and machine learning techniques has been proposed. Static features like hardware components, permissions, Android components and inter-component communication along with unique source-sink pairs obtained from data flow analysis have been used to extract the features of the Android applications. Based on the features extracted, the malicious behaviour of the applications has been classified to their respective malware family. The proposed approach has given 95.19% accuracy rate and F1 measure of 92.19302 with the largest number of malware families classified as compared to previous work.
引用
收藏
页码:57 / 73
页数:17
相关论文
共 50 条
  • [41] Exploring the Malicious Android Applications and Reducing Risk using Static Analysis
    Kavitha, K.
    Salini, P.
    Ilamathy, V
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1316 - 1319
  • [42] Android malicious behavior recognition and classification method based on random forest algorithm
    Ke D.-X.
    Pan L.-M.
    Luo S.-L.
    Zhang H.-Q.
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2019, 53 (10): : 2013 - 2023
  • [43] Extracting Android Malicious Behaviors
    Khanh-Huu-The Dam
    Touili, Tayssir
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 714 - 723
  • [44] Call Graph and Model Checking for Fine-Grained Android Malicious Behaviour Detection
    Iadarola, Giacomo
    Martinelli, Fabio
    Mercaldo, Francesco
    Santone, Antonella
    APPLIED SCIENCES-BASEL, 2020, 10 (22): : 1 - 20
  • [45] A Multidimensional Detection Model of Android Malicious Applications Based on Dynamic and Static Analysis
    Zhang, Hao
    Liu, Donglan
    Liu, Xin
    Ma, Lei
    Wang, Rui
    Zhang, Fangzhe
    Sun, Lili
    Zhao, Fuhui
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND NETWORKS, VOL III, CENET 2023, 2024, 1127 : 11 - 21
  • [46] Smartphone Dual Defense Protection Framework: Detecting malicious applications in Android Markets
    Su, X.
    Chuah, M.
    Tan, G.
    2012 EIGHTH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR NETWORKS (MSN 2012), 2012, : 153 - 160
  • [47] Detection of Android Applications with Malicious Behavior Based on Sparse Bayesian Learning Algorithm
    Liu, Ning
    Yang, Min
    Zhang, Hang
    Yang, Chen
    Zhao, Yang
    Gan, Jianchao
    Zhang, Shibin
    CLOUD COMPUTING AND SECURITY, PT V, 2018, 11067 : 266 - 275
  • [48] Detection of Android Malicious Obfuscation Applications Based on Multi-class Features
    Zhao, Meichen
    2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 1795 - 1799
  • [49] ZTA: a novel zero trust framework for detection and prevention of malicious android applications
    Nazir, Aleena
    Iqbal, Zafar
    Muhammad, Zia
    WIRELESS NETWORKS, 2025, : 3187 - 3203
  • [50] Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection
    Wang, Wei
    Wang, Xing
    Feng, Dawei
    Liu, Jiqiang
    Han, Zhen
    Zhang, Xiangliang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (11) : 1869 - 1882