Android Malware Family Classification and Analysis: Current Status and Future Directions

被引:31
作者
Alswaina, Fahad [1 ]
Elleithy, Khaled [1 ]
机构
[1] Univ Bridgeport, Dept Comp Sci & Engn, Bridgeport, CT 06604 USA
关键词
android malware family; malicious application; android security; android application; machine learning; classification; smartphone; FEATURES; CODE;
D O I
10.3390/electronics9060942
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Android receives major attention from security practitioners and researchers due to the influx number of malicious applications. For the past twelve years, Android malicious applications have been grouped into families. In the research community, detecting new malware families is a challenge. As we investigate, most of the literature reviews focus on surveying malware detection. Characterizing the malware families can improve the detection process and understand the malware patterns. For this reason, we conduct a comprehensive survey on the state-of-the-art Android malware familial detection, identification, and categorization techniques. We categorize the literature based on three dimensions: type of analysis, features, and methodologies and techniques. Furthermore, we report the datasets that are commonly used. Finally, we highlight the limitations that we identify in the literature, challenges, and future research directions regarding the Android malware family.
引用
收藏
页码:1 / 20
页数:20
相关论文
共 101 条
  • [1] Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
  • [2] Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification
    Ahmadi, Mansour
    Ulyanov, Dmitry
    Semenov, Stanislav
    Trofimov, Mikhail
    Giacinto, Giorgio
    [J]. CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, : 183 - 194
  • [3] UpDroid: Updated Android Malware and Its Familial Classification
    Aktas, Kursat
    Sen, Sevil
    [J]. SECURE IT SYSTEMS, 2018, 11252 : 352 - 368
  • [4] Intelligent mobile malware detection using permission requests and API calls
    Alazab, Moutaz
    Alazab, Mamoun
    Shalaginov, Andrii
    Mesleh, Abdelwadood
    Awajan, Albara
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 107 : 509 - 521
  • [5] Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1109/MSR.2016.056, 10.1145/2901739.2903508]
  • [6] Android Malware Permission-Based Multi-Class Classification Using Extremely Randomized Trees
    Alswaina, Fahad
    Elleithy, Khaled
    [J]. IEEE ACCESS, 2018, 6 : 76217 - 76227
  • [7] Static malware detection and attribution in android byte-code through an end-to-end deep system
    Amin, Muhammad
    Tanveer, Tamleek Ali
    Tehseen, Mohammad
    Khan, Murad
    Khan, Fakhri Alam
    Anwar, Sajid
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 102 : 112 - 126
  • [8] [Anonymous], 2020, DEXGUARD
  • [9] [Anonymous], 2018, Mcafee mobile threat report q1
  • [10] [Anonymous], 2020, ProGuard