A Combination Method for Android Malware Detection Based on Control Flow Graphs and Machine Learning Algorithms

被引:113
作者
Ma, Zhuo [1 ,2 ]
Ge, Haoran [1 ]
Liu, Yang [1 ]
Zhao, Meng [1 ]
Ma, Jianfeng [1 ,2 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Shaanxi, Peoples R China
[2] Shaanxi Key Lab Network & Syst Secur, Xian 710071, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Control flow graph; application programming interface; machine learning; malware detection;
D O I
10.1109/ACCESS.2019.2896003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Android malware severely threaten system and user security in terms of privilege escalation, remote control, tariff theft, and privacy leakage. Therefore, it is of great importance and necessity to detect Android malware. In this paper, we present a combination method for Android malware detection based on the machine learning algorithm. First, we construct the control flow graph of the application to obtain API information. Based on the API information, we innovatively construct Boolean, frequency, and time-series data sets. Based on these three data sets, three detection models for Android malware detection regarding API calls, API frequency, and API sequence aspects are constructed. Ultimately, an ensemble model is constructed for conformity. We tested and compared the accuracy and stability of our detection models through a large number of experiments. The experiments were conducted on 10010 benign applications and 10683 malicious applications. The results show that our detection model achieves 98.98% detection precision and has high accuracy and stability. All of the results are consistent with the theoretical analysis in this paper.
引用
收藏
页码:21235 / 21245
页数:11
相关论文
共 40 条
[1]  
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1109/MSR.2016.056, 10.1145/2901739.2903508]
[2]  
[Anonymous], 2011, USENIX SEC S
[3]  
[Anonymous], 2015, Internet Security Threat Report, V20
[4]  
[Anonymous], 2012, NDSS
[5]  
[Anonymous], 2018, 2018 INT SEC THREAT
[6]  
[Anonymous], 2018, PROC IEEE WIRELESS C
[7]  
[Anonymous], J OPER RES SOC
[8]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[9]  
Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2666356.2594299, 10.1145/2594291.2594299]
[10]  
Atici MA, 2016, 2016 4TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), P26, DOI 10.1109/ISDFS.2016.7473512