Fingerprinting Android malware families

被引:29
|
作者
Xie, Nannan [1 ,2 ]
Wang, Xing [1 ]
Wang, Wei [1 ]
Liu, Jiqiang [1 ]
机构
[1] Beijing Jiaotong Univ, Beijing Key Lab Secur & Privacy Intelligent Trans, Beijing 100044, Peoples R China
[2] Changchun Univ Sci & Technol, Sch Comp Sci & Technol, Changchun 130022, Jilin, Peoples R China
基金
中国国家自然科学基金;
关键词
Android malware; malware family; feature selection; behavior analysis; AUDIT DATA STREAMS;
D O I
10.1007/s11704-017-6493-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The domination of the Android operating system in the market share of smart terminals has engendered increasing threats of malicious applications (apps). Research on Android malware detection has received considerable attention in academia and the industry. In particular, studies on malware families have been beneficial to malware detection and behavior analysis. However, identifying the characteristics of malware families and the features that can describe a particular family have been less frequently discussed in existing work. In this paper, we are motivated to explore the key features that can classify and describe the behaviors of Android malware families to enable fingerprinting the malware families with these features. We present a framework for signature-based key feature construction. In addition, we propose a frequency-based feature elimination algorithm to select the key features. Finally, we construct the fingerprints of ten malware families, including twenty key features in three categories. Results of extensive experiments using Support Vector Machine demonstrate that the malware family classification achieves an accuracy of 92% to 99%. The typical behaviors of malware families are analyzed based on the selected key features. The results demonstrate the feasibility and effectiveness of the presented algorithm and fingerprinting method.
引用
收藏
页码:637 / 646
页数:10
相关论文
共 50 条
  • [41] Monitoring Real Android Malware
    Kuester, Jan-Christoph
    Bauer, Andreas
    RUNTIME VERIFICATION, RV 2015, 2015, 9333 : 136 - 152
  • [42] A Comparative Analysis of Android Malware
    Chavan, Neeraj
    Di Troia, Fabio
    Stamp, Mark
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 664 - 673
  • [43] Android malware analysis in a nutshell
    Almomani, Iman
    Ahmed, Mohanned
    El-Shafai, Walid
    PLOS ONE, 2022, 17 (07):
  • [44] An Analysis of Android Malware Behavior
    Singh, Gagandeep
    Jaafar, Fehmi
    Zavarsky, Pavol
    2018 IEEE 18TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2018, : 505 - 512
  • [45] Android malware detection model
    Yang H.
    Na Y.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2019, 46 (03): : 45 - 51
  • [46] Android Fragmentation in Malware Detection
    Long Nguyen-Vu
    Ahn, Jinung
    Jung, Souhwan
    COMPUTERS & SECURITY, 2019, 87
  • [47] Performance of Malware classifier for Android
    Alam, Mohammed S.
    Vuong, Son T.
    2015 INTERNATIONAL CONFERENCE AND WORKSHOP ON COMPUTING AND COMMUNICATION (IEMCON), 2015,
  • [48] Darwinian Malware Detectors: A Comparison of Evolutionary Solutions to Android Malware
    Wilkins, Zachary
    Zincir-Heywood, Nur
    PROCEEDINGS OF THE 2019 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE COMPANION (GECCCO'19 COMPANION), 2019, : 1651 - 1658
  • [49] Composition-malware: building Android malware at run time
    Canfora, Gerardo
    Mercaldo, Francesco
    Moriano, Giovanni
    Visaggio, Corrado Aaron
    PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 318 - 326
  • [50] On Fingerprinting of Public Malware Analysis Services
    Botas, Alvaro
    Rodriguez, Ricardo J.
    Matellan, Vicente
    Garcia, Juan F.
    Trobajo, M. T.
    Carriegos, Miguel, V
    LOGIC JOURNAL OF THE IGPL, 2020, 28 (04) : 473 - 486