Malware Detection in Smartphone Using Hidden Markov Model

被引:6
|
作者
Xin, Kejun [1 ]
Li, Gang [1 ]
Qin, Zhongyuan [2 ,3 ]
Zhang, Qunfang [4 ]
机构
[1] Nanjing Sample Technol Co Ltd, Nanjing, Jiangsu, Peoples R China
[2] Southeast Univ, Informat Sci & Engn Sch, Nanjing, Jiangsu, Peoples R China
[3] Minist Publ Secur, Key Lab Informat Network Secur, Shanghai, Peoples R China
[4] Nanjing Inst Artillery Corps, Dept Comp, Nanjing, Jiangsu, Peoples R China
关键词
smartphone malware; behavior detection; system function calls; Hidden Markov Model(HMM);
D O I
10.1109/MINES.2012.134
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, smart phone technology is becoming increasingly popular. The dangers of mobile phone malwares are becoming more and more serious. In this paper we present a new mobile smartphone malware detection scheme based on Hidden Markov Model (HMM) which is different from the traditional signature scanning methods. Firstly, we monitor the key press and system function call sequence, and take the key press as hidden state. After decoding HMM model, abnormal process can be detected using the matching rate of HMM output to the actual key press sequence. The experimental results demonstrate that the proposed method can effectively detect mobile malwares.
引用
收藏
页码:857 / 860
页数:4
相关论文
共 50 条
  • [21] Attack Sequence Detection in Cloud Using Hidden Markov Model
    Chen, Chia-Mei
    Guan, D. J.
    Huang, Yu-Zhi
    Ou, Ya-Hui
    PROCEEDINGS OF THE 2012 SEVENTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2012), 2012, : 100 - 103
  • [22] Collusion set detection using a quasi hidden Markov model
    Wu, Zhengxiao
    Wu, Xiaoyu
    STATISTICS AND ITS INTERFACE, 2013, 6 (01) : 53 - 64
  • [23] Patterns of Fraud Detection Using Coupled Hidden Markov Model
    Sungkono, Kelly R.
    Sarno, Riyanarto
    2017 3RD INTERNATIONAL CONFERENCE ON SCIENCE IN INFORMATION TECHNOLOGY (ICSITECH), 2017, : 235 - 240
  • [24] Credit card fraud detection using hidden Markov model
    Srivastava, Abhinav
    Kundu, Amlan
    Sural, Shamik
    Majumdar, Arun K.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2008, 5 (01) : 37 - 48
  • [25] ANOMALY NETWORK INTRUSION DETECTION USING HIDDEN MARKOV MODEL
    Chen, Chia-Mei
    Guan, Dah-Jyh
    Huang, Yu-Zhi
    Ou, Ya-Hui
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2016, 12 (02): : 569 - 580
  • [26] Markov Financial Model Using Hidden Markov Model
    Luc Tri Tuyen
    INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS & STATISTICS, 2013, 40 (10): : 72 - 83
  • [27] Development of a Heuristic Mechanism for Detection of Malware Programs Based on Hidden Markov Models
    Kozachok, A. V.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2018, 52 (08) : 1117 - 1123
  • [28] Smartphone Malware Detection Model Based on Artificial Immune System
    Wu Bin
    Lu Tianliang
    Zheng Kangfeng
    Zhang Dongmei
    Lin Xing
    CHINA COMMUNICATIONS, 2014, 11 (01) : 86 - 92
  • [29] Ultrasonic Flaw Detection using Hidden Markov Model with Wavelet Features
    Virupakshappa, Kushal
    Oruklu, Erdal
    2016 IEEE INTERNATIONAL ULTRASONICS SYMPOSIUM (IUS), 2016,
  • [30] Activation detection on fMRI time series using Hidden Markov Model
    Duan, R
    Man, H
    Jiang, W
    Liu, WC
    2005 2ND INTERNATINOAL IEEE/EMBS CONFERENCE ON NEURAL ENGINEERING, 2005, : 510 - 513