Ensemble Framework Combining Family Information for Android Malware Detection

被引:1
作者
Li, Yao [1 ]
Xiong, Zhi [2 ]
Zhang, Tao [1 ]
Zhang, Qinkun [2 ]
Fan, Ming [3 ,4 ]
Xue, Lei [5 ]
机构
[1] Macau Univ Sci & Technol, Sch Comp Sci & Engn, Ave Wai Long, Macau 999078, Macao, Peoples R China
[2] Shantou Univ, Dept Comp Sci & Technol, Univ Rd, Shantou 515063, Guangdong, Peoples R China
[3] Chongqing Univ, Minist Educ China, Key Lab Dependable Serv Comp Cyber Phys Soc, Chongqing 400044, Peoples R China
[4] Xi An Jiao Tong Univ, Xianning West Rd, Xian 710049, Shaanxi, Peoples R China
[5] Hong Kong Polytech Univ, Dept Comp, Hung Hom, Kowloon, Hong Kong 999077, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Android; malware family; family information; conspicuousness evaluator; ensemble framework; SYSTEM;
D O I
10.1093/comjnl/bxac114
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Each malware application belongs to a specific malware family, and each family has unique characteristics. However, existing Android malware detection schemes do not pay attention to the use of malware family information. If the family information is exploited well, it could improve the accuracy of malware detection. In this paper, we propose a general Ensemble framework combining Family Information for Android Malware Detector, called EFIMDetector. First, eight categories of features are extracted from Android application packages. Then, we define the malware family with a large sample size as a prosperous family and construct a classifier for each prosperous family as a conspicuousness evaluator for the family characteristics. These conspicuousness evaluators are combined with a general classifier (which can be a base or ensemble classifier in itself), called the final classifier, to form a two-layer ensemble framework. For the samples of prosperous families with conspicuous family characteristics, the conspicuousness evaluators directly provide detection results. For other samples (including the samples of prosperous families with nonconspicuous family characteristics and the samples of nonprosperous families), the final classifier is responsible for detection. Seven common base classifiers and three common ensemble classifiers are used to detect malware in the experiment. The results show that the proposed ensemble framework can effectively improve the detection accuracy of these classifiers.
引用
收藏
页码:2721 / 2740
页数:20
相关论文
共 62 条
[1]   Intelligent mobile malware detection using permission requests and API calls [J].
Alazab, Moutaz ;
Alazab, Mamoun ;
Shalaginov, Andrii ;
Mesleh, Abdelwadood ;
Awajan, Albara .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 107 :509-521
[2]  
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1109/MSR.2016.056, 10.1145/2901739.2903508]
[3]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[4]  
avira, AVIRA ANTIVIRUS
[5]   A collaborative approach on host and network level android malware detection [J].
Bae, Chanwoo ;
Shin, Seungwon .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) :5639-5650
[6]   VisDroid: Android malware classification based on local and global image features, bag of visual words and machine learning techniques [J].
Bakour, Khaled ;
Unver, Halil Murat .
NEURAL COMPUTING & APPLICATIONS, 2021, 33 (08) :3133-3153
[7]  
Beckert-Plewka Kathrin, 2020, G DATA Mobile Malware Report: Harmful Android apps every eight seconds
[8]   Effectiveness of Opcode ngrams for Detection of Multi Family Android Malware [J].
Canfora, Gerardo ;
De Lorenzo, Andrea ;
Medvet, Eric ;
Mercaldo, Francesco ;
Visaggio, Corrado Aaron .
PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, :333-340
[9]  
Chebyshev V., 2021, Kaspersky
[10]   XGBoost: A Scalable Tree Boosting System [J].
Chen, Tianqi ;
Guestrin, Carlos .
KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, :785-794