VolMemDroid-Investigating android malware insights with volatile memory artifacts

被引:2
作者
Khalid, Saneeha [1 ]
Hussain, Faisal Bashir [1 ]
机构
[1] Bahria Univ, Islamabad 44000, Pakistan
关键词
Android malware; Dynamic analysis; Memory forensics; Feature selection; Classification; RANDOM FOREST; MACHINE;
D O I
10.1016/j.eswa.2024.124347
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Android based smartphones have become a top target for malware writers due to their widespread use. A number of malicious applications are present on play stores and downloaded on daily basis, posing a significant threat to users' personal and business data. As a result, the design of malware analysis frameworks is crucial in protecting the growing number of users who rely on their smart phones for routine and business tasks. The traditional signature based schemes for malware detection are unable to handle new and sophisticated malware. Furthermore, generic solutions based on static analysis schemes become less effective in the presence of obfuscated malware. In this study, a dynamic analysis based framework, VolMemDroid, for detecting malicious applications for Android is proposed. The framework extracts the volatile memory artifacts for profiling malicious Android applications. For this purpose, the memory forensic framework of volatility is utilized. A number of volatility plugins are analyzed for their compatibility w.r.t the Android platform and their ability in modeling the application's behavior. After testing a number of plugins, chosen plugins are further processed for extraction of features. A comprehensive feature set for Android malware detection and categorization is proposed. It has been found that the suggested framework is effective for detecting Android malicious applications with an F1 -score of 0.972, which is better than existing volatile memory based approaches for Android malware detection. The framework is also found to be effective in categorizing malicious Android applications into four distinct classes.
引用
收藏
页数:18
相关论文
共 43 条
[1]   Feature Subset Selection for Malware Detection in Smart IoT Platforms [J].
Abawajy, Jemal ;
Darem, Abdulbasit ;
Alhashmi, Asma A. .
SENSORS, 2021, 21 (04) :1-19
[2]   Identifying Android malware using dynamically obtained features [J].
Afonso, Vitor Monte ;
de Amorim, Matheus Favero ;
Abed Gregio, Andre Ricardo ;
Junquera, Glauco Barroso ;
de Geus, Paulo Licio .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2015, 11 (01) :9-17
[3]   Lightweight versus obfuscation-resilient malware detection in android applications [J].
Aghamohammadi, Ali ;
Faghih, Fathiyeh .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2020, 16 (02) :125-139
[4]  
Agrawal Prerna, 2021, Data Management, Analytics and Innovation. Proceedings of ICDMAI 2020. Advances in Intelligent Systems and Computing (AISC 1174), P311, DOI 10.1007/978-981-15-5616-6_22
[5]   Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection [J].
Ahmad, Iftikhar ;
Basheri, Mohammad ;
Iqbal, Muhammad Javed ;
Rahim, Aneel .
IEEE ACCESS, 2018, 6 :33789-33795
[6]  
Alawneh H., 2019, 2019 14 INT C MAL UN, P3
[7]   Feature Selection Using Information Gain for Improved Structural-Based Alert Correlation [J].
Alhaj, Taqwa Ahmed ;
Siraj, Maheyzah Md ;
Zainal, Anazida ;
Elshoush, Huwaida Tagelsir ;
Elhaj, Fatin .
PLOS ONE, 2016, 11 (11)
[8]   cRGB_Mem: At the intersection of memory forensics and machine learning [J].
Ali-Gombe, Aisha ;
Sudhakaran, Sneha ;
Vijayakanthan, Ramyapandian ;
Richard, Golden G., III .
FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2023, 45
[9]   Catch them alive: A malware detection approach through memory forensics, manifold learning and computer vision [J].
Bozkir, Ahmet Selman ;
Tahillioglu, Ersan ;
Aydos, Murat ;
Kara, Ilker .
COMPUTERS & SECURITY, 2021, 103
[10]   Bagging predictors [J].
Breiman, L .
MACHINE LEARNING, 1996, 24 (02) :123-140