A Novel Knowledge Search Structure for Android Malware Detection

被引:0
作者
Zhu, Huijuan [1 ]
Xia, Mengzhen [1 ]
Wang, Liangmin [2 ]
Xu, Zhicheng [3 ]
Sheng, Victor S. [4 ]
机构
[1] Jiangsu Univ, Sch Comp Sci & Commun Engn, Zhenjiang 212013, Peoples R China
[2] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 211102, Peoples R China
[3] Jiangsu Univ, Sch Math Sci, Zhenjiang 212013, Peoples R China
[4] Texas Tech Univ, Dept Comp Sci, Lubbock, TX 79409 USA
基金
中国国家自然科学基金;
关键词
Malware; Feature extraction; Operating systems; Static analysis; Smart phones; Computational modeling; Deep learning; Vectors; Security; Radio frequency; Android; malware detection; knowledge distillation; neural architecture search; multi-layer perceptron; INFORMATION; FRAMEWORK;
D O I
10.1109/TSC.2024.3496333
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While the Android platform is gaining explosive popularity, the number of malicious software (malware) is also increasing sharply. Thus, numerous malware detection schemes based on deep learning have been proposed. However, they are usually suffering from the cumbersome models with complex architectures and tremendous parameters. They usually require heavy computation power support, which seriously limit their deployment on actual application environments with limited resources (e.g., mobile edge devices). To surmount this challenge, we propose a novel Knowledge Distillation (KD) structure-Knowledge Search (KS). KS exploits Neural Architecture Search (NAS) to adaptively bridge the capability gap between teacher and student networks in KD by introducing a parallelized student-wise search approach. In addition, we carefully analyze the characteristics of malware and locate three cost-effective types of features closely related to malicious attacks, namely, Application Programming Interfaces (APIs), permissions and vulnerable components, to characterize Android Applications (Apps). Therefore, based on typical samples collected in recent years, we refine features while exploiting the natural relationship between them, and construct corresponding datasets. Massive experiments are conducted to investigate the effectiveness and sustainability of KS on these datasets. Our experimental results show that the proposed method yields an accuracy of 97.89% to detect Android malware, which performs better than state-of-the-art solutions.
引用
收藏
页码:3052 / 3064
页数:13
相关论文
共 65 条
[1]   Intelligent mobile malware detection using permission requests and API calls [J].
Alazab, Moutaz ;
Alazab, Mamoun ;
Shalaginov, Andrii ;
Mesleh, Abdelwadood ;
Awajan, Albara .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 107 :509-521
[2]   DINA: Detecting Hidden Android Inter-App Communication in Dynamic Loaded Code [J].
Alhanahnah, Mohannad ;
Yan, Qiben ;
Bagheri, Hamid ;
Zhou, Hao ;
Tsutano, Yutaka ;
Srisa-an, Witawas ;
Luo, Xiapu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :2782-2797
[3]  
Allix K., 2022, AndroZoo
[4]  
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1145/2901739.2903508, 10.1109/MSR.2016.056]
[5]  
[Anonymous], 2019, Desktop operating system market share worldwide, P1
[6]  
[Anonymous], MMH. (2018). (in Mongolian). Available online: http://tushig.se.gov.mn/upload/files/2020-04-29_09-3701.pdf?fbclid=IwAR2tWIpEbi3PcdiyD-6dT5Lha_SbryWQIAi-8pQvYBiEmT95ad7vtB_vFI Accessed on 08 April, 2022.
[7]  
[Anonymous], [5] Drozer - https://labs.f-secure.com/tools/drozer/
[8]   PermPair: Android Malware Detection Using Permission Pairs [J].
Arora, Anshul ;
Peddoju, Sateesh K. ;
Conti, Mauro .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :1968-1982
[9]   DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans [J].
Bai, Chongyang ;
Han, Qian ;
Mezzour, Ghita ;
Pierazzi, Fabio ;
Subrahmanian, V. S. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) :1378-1393
[10]   Embracing Mobile App Evolution via Continuous Ecosystem Mining and Characterization [J].
Cai, Haipeng .
2020 IEEE/ACM 7TH INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS, MOBILESOFT, 2020, :31-35