Recurrent Neural Networks for Colluded Applications Attack Detection in Android OS Devices

被引:0
作者
Khokhlov, Igor [1 ]
Ligade, Ninad [1 ]
Reznik, Leon [1 ]
机构
[1] Rochester Inst Technol, Golisano Coll Comp & Informat Sci, Rochester, NY 14623 USA
来源
2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN) | 2020年
关键词
Recurrent neural networks; anomaly based attack detection; Android device security;
D O I
10.1109/ijcnn48605.2020.9207339
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The paper presents a design and an implementation of an intelligent detector of a novel "colluded applications" attack on user's privacy in Android OS devices, which employs recurrent neural network (RNN) models. The paper reports the results of an empirical study that involved the attack research, data collection and pre-processing, the choice of the RNN model for a detector design, multiple detector implementations, their performance evaluation and analysis, and finally, an Android app realization and execution on a real device. We investigate and analyze multiple attack scenarios and the attack influence on such technological signals as memory consumption and a CPU's cores clock speed. For the attack detection, a few detectors exploring multiple RNN models are designed, implemented, and examined. The detectors employ various RNN models, such as a simple recurrent neural network, a long short-term memory, and a gated recurrent unit. Each model's performance in detecting multiple attack scenarios is evaluated and analyzed in order to compare classification models against various criteria.
引用
收藏
页数:8
相关论文
共 23 条
[1]  
[Anonymous], 2016, Mcafee labs threats report
[2]  
ASAVOAE IM, 2016, ARXIV160302308
[3]   Detection of app collusion potential using logic programming [J].
Blasco, Jorge ;
Chen, Thomas M. ;
Muttik, Igor ;
Roggenbach, Markus .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 105 :88-104
[4]   Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications [J].
Bosu, Amiangshu ;
Liu, Fang ;
Yao, Danfeng ;
Wang, Gang .
PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, :71-85
[5]  
Bosu Amiangshu., 2018, Android collusive data leaks with flow-sensitive dialdroid dataset
[6]  
Bugiel Sven., 2011, XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks
[7]  
Chung J., 2014, NIPS 2014 WORKSHOP D
[8]  
Cimpanu Catalin, 2016, 21 ANDROID APPS SPOT
[9]  
Cimpanu Catalin., 2015, 100 million android users may have a backdoor on their device thanks to the baidu sdk
[10]   TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones [J].
Enck, William ;
Gilbert, Peter ;
Han, Seungyeop ;
Tendulkar, Vasant ;
Chun, Byung-Gon ;
Cox, Landon P. ;
Jung, Jaeyeon ;
McDaniel, Patrick ;
Sheth, Anmol N. .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2014, 32 (02)