Android malware detection based on system call sequences and LSTM

被引:155
作者
Xiao, Xi [1 ]
Zhang, Shaofeng [1 ]
Mercaldo, Francesco [2 ]
Hu, Guangwu [3 ]
Sangaiah, Arun Kumar [4 ]
机构
[1] Tsinghua Univ, Grad Sch Shenzhen, Shenzhen 518055, Peoples R China
[2] Natl Res Council Italy, Inst Informat & Telemat, I-56124 Pisa, Italy
[3] Shenzhen Inst Informat Technol, Sch Comp Sci, Shenzhen 518172, Peoples R China
[4] VIT Univ, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
关键词
Android malware detection; System call sequences; Deep learning; LSTM language model;
D O I
10.1007/s11042-017-5104-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As Android-based mobile devices become increasingly popular, malware detection on Android is very crucial nowadays. In this paper, a novel detection method based on deep learning is proposed to distinguish malware from trusted applications. Considering there is some semantic information in system call sequences as the natural language, we treat one system call sequence as a sentence in the language and construct a classifier based on the Long Short-Term Memory (LSTM) language model. In the classifier, at first two LSTM models are trained respectively by the system call sequences from malware and those from benign applications. Then according to these models, two similarity scores are computed. Finally, the classifier determines whether the application under analysis is malicious or trusted by the greater score. Thorough experiments show that our approach can achieve high efficiency and reach high recall of 96.6% with low false positive rate of 9.3%, which is better than the other methods.
引用
收藏
页码:3979 / 3999
页数:21
相关论文
共 32 条
[1]  
[Anonymous], 2015, 6 1B SMARTPHONE USER
[2]  
[Anonymous], NEURAL NETWORK BASED
[3]  
[Anonymous], 2015, Security and Privacy in Communication Networks-11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers, volume 164 of SecureComm' 15
[4]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[5]  
Battista P, 2016, P INT C INF SYST SEC
[6]   LEARNING LONG-TERM DEPENDENCIES WITH GRADIENT DESCENT IS DIFFICULT [J].
BENGIO, Y ;
SIMARD, P ;
FRASCONI, P .
IEEE TRANSACTIONS ON NEURAL NETWORKS, 1994, 5 (02) :157-166
[7]  
Bengio Y, 2001, ADV NEUR IN, V13, P932
[8]   An HMM and structural entropy based detector for Android malware: An empirical study [J].
Canfora, Gerardo ;
Mercaldo, Francesco ;
Visaggio, Corrado Aaron .
COMPUTERS & SECURITY, 2016, 61 :1-18
[9]   Simple and effective method for detecting abnormal internet behaviors of mobile devices [J].
Chen, Patrick Shicheng ;
Lin, Shu-Chiung ;
Sun, Chien-Hsing .
INFORMATION SCIENCES, 2015, 321 :193-204
[10]   StormDroid: A Streaminglized Machine Learning-Based System for Detecting Android Malware [J].
Chen, Sen ;
Xue, Minhui ;
Tang, Zhushou ;
Xu, Lihua ;
Zhu, Haojin .
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :377-388