Fingerprinting Android malware families

被引:0
|
作者
Nannan Xie
Xing Wang
Wei Wang
Jiqiang Liu
机构
[1] Beijing Jiaotong University,Beijing Key Laboratory of Security and Privacy in Intelligent Transportation
[2] Changchun University of Science and Technology,School of Computer Science and Technology
来源
关键词
Android malware; malware family; feature selection; behavior analysis;
D O I
暂无
中图分类号
学科分类号
摘要
The domination of the Android operating system in the market share of smart terminals has engendered increasing threats of malicious applications (apps). Research on Android malware detection has received considerable attention in academia and the industry. In particular, studies on malware families have been beneficial to malware detection and behavior analysis. However, identifying the characteristics of malware families and the features that can describe a particular family have been less frequently discussed in existing work. In this paper, we are motivated to explore the key features that can classify and describe the behaviors of Android malware families to enable fingerprinting the malware families with these features. We present a framework for signature-based key feature construction. In addition, we propose a frequency-based feature elimination algorithm to select the key features. Finally, we construct the fingerprints of ten malware families, including twenty key features in three categories. Results of extensive experiments using Support Vector Machine demonstrate that the malware family classification achieves an accuracy of 92% to 99%. The typical behaviors of malware families are analyzed based on the selected key features. The results demonstrate the feasibility and effectiveness of the presented algorithm and fingerprinting method.
引用
收藏
页码:637 / 646
页数:9
相关论文
共 50 条
  • [21] Scalable and robust unsupervised android malware fingerprinting using community-based network partitioning
    Karbab, ElMouatez Billah
    Debbabi, Mourad
    Derhab, Abdelouahid
    Mouheb, Djedjiga
    COMPUTERS & SECURITY, 2020, 97
  • [22] Learning Android Malware
    Khanh-Huu-The Dam
    Touili, Tayssir
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [23] Android malware and mitigations
    Mansfield-Devine, Steve
    Network Security, 2012, 2012 (11) : 12 - 20
  • [24] Beta-Hebbian Learning to enhance unsupervised exploratory visualizations of Android malware families
    Basurto, Nuno
    Garcia-Prieto, Diego
    Quintian, Hector
    Urda, Daniel
    Calvo-Rolle, Jose Luis
    Corchado, Emilio
    LOGIC JOURNAL OF THE IGPL, 2024, 32 (02) : 306 - 320
  • [25] DENDROID: A text mining approach to analyzing and classifying code structures in Android malware families
    Suarez-Tangil, Guillermo
    Tapiador, Juan E.
    Pens-Lopez, Pedro
    Blasco, Jorge
    EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (04) : 1104 - 1117
  • [26] The Evolution of Android Malware and Android Analysis Techniques
    Tam, Kimberly
    Feizollah, Ali
    Anuar, Nor Badrul
    Salleh, Rosli
    Cavallaro, Lorenzo
    ACM COMPUTING SURVEYS, 2017, 49 (04)
  • [27] Android Malware Analysis and Conceptual Malware Mitigation Approaches
    Oh, Tae
    Kim, Young Ho
    Moon, Hwa Shin
    Kim, Jeong Neyo
    Stackpole, Bill
    2016 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC 2016): TOWARDS SMARTER HYPER-CONNECTED WORLD, 2016, : 684 - 693
  • [28] Deep Android Malware Detection
    McLaughlin, Niall
    del Rincon, Jesus Martinez
    Kang, BooJoong
    Yerima, Suleiman
    Miller, Paul
    Sezer, Sakir
    Safaei, Yeganeh
    Trickel, Erik
    Zhao, Ziming
    Doup, Adam
    Ahn, Gail Joon
    PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 301 - 308
  • [29] Android Platform Malware Analysis
    Alfalqi, Khalid
    Alghamdi, Rubayyi
    Waqdan, Mofareh
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (01) : 140 - 146
  • [30] Detection of Repackaged Android Malware
    Shahriar, Hossain
    Clincy, Victor
    2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 349 - 354