Ransomware Detection System for Android Applications

被引:45
作者
Alsoghyer, Samah [1 ]
Almomani, Iman [2 ,3 ]
机构
[1] King Abdulaziz City Sci & Technol, Riyadh 11442, Saudi Arabia
[2] Prince Sultan Univ, Dept Comp Sci, Riyadh 11586, Saudi Arabia
[3] Univ Jordan, Dept Comp Sci, Amman 11942, Jordan
关键词
Android; malware detection; ransomware; static analysis; dataset; classification; machine learning;
D O I
10.3390/electronics8080868
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Android ransomware is one of the most threatening attacks nowadays. Ransomware in general encrypts or locks the files on the victim's device and requests a payment in order to recover them. The available technologies are not enough as new ransomwares employ a combination of techniques to evade anti-virus detection. Moreover, the literature counts only a few studies that have proposed static and/or dynamic approaches to detect Android ransomware in particular. Additionally, there are plenty of open-source malware datasets; however, the research community is still lacking ransomware datasets. In this paper, the state-of-the-art of Android ransomware detection approaches were investigated. A deep comparative analysis was conducted which shed the key differences among the existing solutions. An application programming interface (API)-based ransomware detection system (API-RDS) was proposed to provide a static analysis paradigm for detecting Android ransomware apps. API-RDS focuses on examining API packages' calls as leading indicator of ransomware activity to discriminate ransomware with high accuracy before it harms the user's device. API packages' calls of both benign and ransomware apps were thoroughly analyzed and compared. Significant API packages with corresponding methods were identified. The experimental results show that API-RDS outperformed other recent related approaches. API-RDS achieved 97% accuracy while reducing the complexity of the classification model by 26% due to features reduction. Moreover, this research designed a proactive mechanism based on a high quality unique ransomware dataset without duplicated samples. 2959 ransomware samples were collected, tested and reduced by almost 83% due to samples duplication. This research also contributes to constructing an up-to-date, unique dataset that covers the majority of existing Android ransomware families and recent clean apps that could be used as a labeled reference for research community.
引用
收藏
页数:36
相关论文
共 82 条
[1]  
Affairs S, 2014, DREBIN ANDR APP DET
[2]  
Akhuseyinoglu N.B., 2016, P 2016 IEEE 7 ANN UB, P1
[3]  
Almomani I., 2019, ANDROID
[4]  
Almomani I., 2019, 2019 IEEE International Conference on Flexible and Printable Sensors and Systems (FLEPS), P1
[5]   Efficient Denial of Service Attacks Detection in Wireless Sensor Networks [J].
Almomani, Iman ;
Alenezi, Mamdouh .
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2018, 34 (04) :977-1000
[6]  
Amos B, 2013, INT WIREL COMMUN, P1666, DOI 10.1109/IWCMC.2013.6583806
[7]  
Android, 2018, PACK IND ANDR DEV
[8]  
Andronio Nicolo, 2015, Research in Attacks, Intrusions and Defenses. 18th International Symposium, RAID 2015. Proceedings: LNCS 9404, P382, DOI 10.1007/978-3-319-26362-5_18
[9]  
[Anonymous], P 33 ANN COMP SEC AP
[10]  
[Anonymous], 2017, GUARDIAN T