Automatic detection of Android crypto ransomware using supervisor reduction

被引:0
作者
Chew, Christopher Jun Wen [1 ]
Malik, Robi [1 ]
Kumar, Vimal [1 ]
Patros, Panos [2 ]
机构
[1] Univ Waikato, Hamilton, New Zealand
[2] Raygun Performance Monitoring, Wellington, New Zealand
来源
DISCRETE EVENT DYNAMIC SYSTEMS-THEORY AND APPLICATIONS | 2024年 / 34卷 / 04期
关键词
Ransomware; Malware detection; System calls; Finite-state automaton; Android; THREAT;
D O I
10.1007/s10626-024-00406-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a finite-state machine based approach to recognise crypto ransomware based on their behaviour. Malicious and benign Android applications are executed to capture the system calls they generate, which are then filtered and tokenised and converted to finite-state machines. The finite-state machines are simplified using supervisor reduction, which generalises the behavioural patterns and produces compact classification models. The classification models can be implemented in a lightweight monitoring system to detect malicious behaviour of running applications quickly. An extensive set of cross validation experiments is carried out to demonstrate the viability of the approach, which show that ransomware can be classified accurately with an F1 score of up to 93.8%.
引用
收藏
页码:539 / 571
页数:33
相关论文
共 58 条
[1]  
Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
[2]  
Akesson K, 2006, WODES 2006: EIGHTH INTERNATIONAL WORKSHOP ON DISCRETE EVENT SYSTEMS, PROCEEDINGS, P384
[3]   Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions [J].
Al-rimy, Bander Ali Saleh ;
Maarof, Mohd Aizaini ;
Shaid, Syed Zainudeen Mohd .
COMPUTERS & SECURITY, 2018, 74 :144-166
[4]   DroidNative: Automating and optimizing detection of Android native code malware variants [J].
Alam, Shahid ;
Qu, Zhengyang ;
Riley, Ryan ;
Chen, Yan ;
Rastogi, Vaibhav .
COMPUTERS & SECURITY, 2017, 65 :230-246
[5]   Robust deep learning early alarm prediction model based on the behavioural smell for android malware [J].
Amer, Eslam ;
El-Sappagh, Shaker .
COMPUTERS & SECURITY, 2022, 116
[6]  
Anderson Hyrum S, 2017, Black Hat
[7]  
Andronio Nicolo, 2015, Research in Attacks, Intrusions and Defenses. 18th International Symposium, RAID 2015. Proceedings: LNCS 9404, P382, DOI 10.1007/978-3-319-26362-5_18
[8]  
[Anonymous], 2015, A SophosLabs Technical Paper
[9]  
APKPure, APKPURE
[10]  
Aurangzeb S, 2017, J INF ASSUR SECUR, V12, P48