Behavioral Malware Detection Approaches for Android

被引:13
作者
Amin, Mohammad Ram [1 ]
Zaman, Mehedee [1 ]
Hossain, Md. Shohrab [1 ]
Atiquzzamant, Mohammed [2 ]
机构
[1] Bangladesh Univ Engn & Technol, Dept Comp Sci & Engn, Dhaka, Bangladesh
[2] Univ Oklahoma, Sch Comp Sci, Norman, OK USA
来源
2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) | 2016年
关键词
Android; malware detection; netstat; pcap; ADB; Busybox;
D O I
10.1109/ICC.2016.7511573
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Android, the fastest growing mobile operating system released in November 2007, boasts of a staggering 1.4 billion active users. Android users are susceptible to malicious applications that can hack into their personal data due to the lack of careful monitoring of their in-device security. There have been numerous works on devising malware detection methods. However, none of earlier works are conclusive enough for direct application and lack experimental validation. In this paper, we have investigated the natures and identities of malicious applications and devised two novel detection approaches for detection: network-based detection and system call based detection approaches. To evaluate our proposed approaches, we performed experiments on a subset of 1260 malwares, acquired from Android Malware Genome Project, a malware database created by Y. Zhou et al. [1] and 227 non-malware (benign) applications. Results show that our system call based approach is able to detect malwares with an accuracy of 87% which is quite significant in general malware detection context. Our proposed detection approaches along with the experimental results will provide security professionals with more precise and quantitative approaches in their investigations of mobile malwares on Android systems.
引用
收藏
页数:6
相关论文
共 8 条
[1]  
[Anonymous], INT J COMPUTER COMMU
[2]  
[Anonymous], 2012, 571B EECE
[3]  
[Anonymous], COMPUTERS SECURITY
[4]  
[Anonymous], TECHNICAL REPRESENTA
[5]   Detection of Mobile Malware in the Wild [J].
Chandramohan, Mahinthan ;
Tan, Hee Beng Kuan .
COMPUTER, 2012, 45 (09) :65-71
[6]  
Isohara T., INTERNATION C COMPUT
[7]  
Zaman M, 2015, 2015 INTERNATIONAL CONFERENCE ON NETWORKING SYSTEMS AND SECURITY (NSYSS), P183
[8]   Dissecting Android Malware: Characterization and Evolution [J].
Zhou, Yajin ;
Jiang, Xuxian .
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, :95-109