A Novel Knowledge Search Structure for Android Malware Detection

被引:0
作者
Zhu, Huijuan [1 ]
Xia, Mengzhen [1 ]
Wang, Liangmin [2 ]
Xu, Zhicheng [3 ]
Sheng, Victor S. [4 ]
机构
[1] Jiangsu Univ, Sch Comp Sci & Commun Engn, Zhenjiang 212013, Peoples R China
[2] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 211102, Peoples R China
[3] Jiangsu Univ, Sch Math Sci, Zhenjiang 212013, Peoples R China
[4] Texas Tech Univ, Dept Comp Sci, Lubbock, TX 79409 USA
基金
中国国家自然科学基金;
关键词
Malware; Feature extraction; Operating systems; Static analysis; Smart phones; Computational modeling; Deep learning; Vectors; Security; Radio frequency; Android; malware detection; knowledge distillation; neural architecture search; multi-layer perceptron; INFORMATION; FRAMEWORK;
D O I
10.1109/TSC.2024.3496333
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While the Android platform is gaining explosive popularity, the number of malicious software (malware) is also increasing sharply. Thus, numerous malware detection schemes based on deep learning have been proposed. However, they are usually suffering from the cumbersome models with complex architectures and tremendous parameters. They usually require heavy computation power support, which seriously limit their deployment on actual application environments with limited resources (e.g., mobile edge devices). To surmount this challenge, we propose a novel Knowledge Distillation (KD) structure-Knowledge Search (KS). KS exploits Neural Architecture Search (NAS) to adaptively bridge the capability gap between teacher and student networks in KD by introducing a parallelized student-wise search approach. In addition, we carefully analyze the characteristics of malware and locate three cost-effective types of features closely related to malicious attacks, namely, Application Programming Interfaces (APIs), permissions and vulnerable components, to characterize Android Applications (Apps). Therefore, based on typical samples collected in recent years, we refine features while exploiting the natural relationship between them, and construct corresponding datasets. Massive experiments are conducted to investigate the effectiveness and sustainability of KS on these datasets. Our experimental results show that the proposed method yields an accuracy of 97.89% to detect Android malware, which performs better than state-of-the-art solutions.
引用
收藏
页码:3052 / 3064
页数:13
相关论文
共 65 条
[51]   DroidMat: Android Malware Detection through Manifest and API Calls Tracing [J].
Wu, Dong-Jie ;
Mao, Ching-Hao ;
Wei, Te-En ;
Lee, Hahn-Ming ;
Wu, Kuo-Ping .
PROCEEDINGS OF THE 2012 SEVENTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2012), 2012, :62-69
[52]   HomDroid: Detecting Android Covert Malware by Social-Network Homophily Analysis [J].
Wu, Yueming ;
Zou, Deqing ;
Yang, Wei ;
Li, Xiang ;
Jin, Hai .
ISSTA '21: PROCEEDINGS OF THE 30TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, 2021, :216-229
[53]   MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis [J].
Wu, Yueming ;
Li, XiaoDi ;
Zou, Deqing ;
Yang, Wei ;
Zhang, Xin ;
Jin, Hai .
34TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2019), 2019, :139-150
[54]   DroidEvolver: Self-Evolving Android Malware Detection System [J].
Xu, Ke ;
Li, Yingjiu ;
Deng, Robert ;
Chen, Kai ;
Xu, Jiayun .
2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2019, :47-62
[55]   NDroid: Toward Tracking Information Flows Across Multiple Android Contexts [J].
Xue, Lei ;
Qian, Chenxiong ;
Zhou, Hao ;
Luo, Xiapu ;
Zhou, Yajin ;
Shao, Yuru ;
Chan, Alvin T. S. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (03) :814-828
[56]   EfficientNet convolutional neural networks-based Android malware detection [J].
Yadav, Pooja ;
Menon, Neeraj ;
Ravi, Vinayakumar ;
Vishvanathan, Sowmya ;
Pham, Tuan D. .
COMPUTERS & SECURITY, 2020, 115
[57]   An Image-inspired and CNN-based Android Malware Detection Approach [J].
Yang, Shao .
34TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2019), 2019, :1259-1261
[58]   TaintMan: An ART-Compatible Dynamic Taint Analysis Framework on Unmodified and Non-Rooted Android Devices [J].
You, Wei ;
Liang, Bin ;
Shi, Wenchang ;
Wang, Peng ;
Zhang, Xiangyu .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (01) :208-221
[59]  
Zhang ZQ, 2020, AAAI CONF ARTIF INTE, V34, P1210
[60]   On the Impact of Sample Duplication in Machine-Learning-Based Android Malware Detection [J].
Zhao, Yanjie ;
Li, Li ;
Wang, Haoyu ;
Cai, Haipeng ;
Bissyande, Tegawende F. ;
Klein, Jacques ;
Grundy, John .
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021, 30 (03)