On the Efficacy of Static Features to Detect Malicious Applications in Android

被引:1
|
作者
Geneiatakis, Dimitris [1 ]
Satta, Riccardo [2 ]
Fovino, Igor Nai [2 ]
Neisse, Ricardo [2 ]
机构
[1] Aristotle Univ Thessaloniki, Elect & Comp Engn Dept, GR-54124 Thessaloniki, Greece
[2] Commiss European Communities, Joint Res Ctr JRC, Inst Protect & Secur Citizen IPSC, I-21027 Ispra, Italy
关键词
MALWARE DETECTION;
D O I
10.1007/978-3-319-22906-5_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Android OS environment is today increasingly targeted by malwares. Traditional signature based detection algorithms are not able to provide complete protection especially against ad-hoc created malwares. In this paper, we present a feasibility analysis for enhancing the detection accuracy on Android malware for approaches relying on machine learning classifiers and Android applications' static features. Specifically, our study builds on the basis of machine learning classifiers operating over different fusion rules on Android applications' permissions and APIs. We analyse the performance of different configurations in terms of false alarms tradeoff. Results demonstrate that malware detection accuracy could be enhanced in case that detection approaches introduce additional fusion rules e.g., squared average score over the examined features.
引用
收藏
页码:87 / 98
页数:12
相关论文
共 50 条
  • [31] A Hidden Markov Model Detection of Malicious Android Applications at Runtime
    Chen, Yang
    Ghorbanzadeh, Mo
    Ma, Kevin
    Clancy, Charles
    McGwier, Robert
    2014 23RD WIRELESS AND OPTICAL COMMUNICATION CONFERENCE (WOCC), 2014,
  • [32] DroidEcho: an in-depth dissection of malicious behaviors in Android applications
    Meng, Guozhu
    Feng, Ruitao
    Bai, Guangdong
    Chen, Kai
    Liu, Yang
    CYBERSECURITY, 2018, 1 (01)
  • [33] SteaelErgon: A Framework for Injecting Colluding Malicious Payload in Android Applications
    Casolare, Rosangela
    Ciaramella, Giovanni
    Martinelli, Fabio
    Mercaldo, Francesco
    Santone, Antonella
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [34] Contrasting Permission Patterns between Clean and Malicious Android Applications
    Moonsamy, Veelasha
    Rong, Jia
    Liu, Shaowu
    Li, Gang
    Batten, Lynn
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2013, 2013, 127 : 69 - 85
  • [35] Automatically Detecting Malicious Sensitive Data Usage in Android Applications
    Yan, Hongbing
    Xiong, Yan
    Huang, Wenchao
    Huang, Jianmeng
    Meng, Zhaoyi
    2018 4TH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM 2018), 2018, : 102 - 107
  • [36] Mining permission patterns for contrasting clean and malicious android applications
    Moonsamy, Veelasha
    Rong, Jia
    Liu, Shaowu
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 36 : 122 - 132
  • [37] Detecting malicious Android applications based on the network packets generated
    de la Puerta, Jose Gaviria
    Pastor-Lopez, Iker
    Porto, Igone
    Sanz, Borja
    Garcia Bringas, Pablo
    NEUROCOMPUTING, 2021, 456 : 629 - 636
  • [38] A detection model of malicious Android applications based on Naive Bayes
    Wang, Chundong
    Zhao, Yi
    Mo, Xiuliang
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2019, 11 (04) : 508 - 515
  • [39] CSForest: an approach for imbalanced family classification of android malicious applications
    Dhalaria M.
    Gandotra E.
    International Journal of Information Technology, 2021, 13 (3) : 1059 - 1071
  • [40] Reversing and auditing of android malicious applications using sandboxing environment
    Raymond, V. Joseph
    Raj, R. Jeberson Retna
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2020, 12 (04) : 386 - 396