Detection, Traceability, and Propagation of Mobile Malware Threats

被引:6
作者
Chen, Long [1 ,2 ,3 ]
Xia, Chunhe [1 ,4 ]
Lei, Shengwei [1 ]
Wang, Tianbo [1 ,5 ]
机构
[1] Beihang Univ, Beijing Key Lab Network Technol, Beijing 100191, Peoples R China
[2] Beijing Topsec Network Secur Technol Co Ltd, Innovat Technol Res Inst, Beijing 100085, Peoples R China
[3] China United Network Commun Ltd, Home Internet Operat Ctr, Beijing 100032, Peoples R China
[4] Guangxi Normal Univ, Sch Comp Sci & Informat Technol, Guilin 541004, Peoples R China
[5] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100191, Peoples R China
来源
IEEE ACCESS | 2021年 / 9卷
基金
中国国家自然科学基金;
关键词
Android mobile malware; threat traceability; family chronology; propagation models; detection analysis; infected system environment; knowledge map construction; architecture of mobile malware security analysis; MODEL;
D O I
10.1109/ACCESS.2021.3049819
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, the application of smartphones, Android operating systems and mobile applications have become more prevalent worldwide. To study the traceability, propagation, and detection of the threats, we perform research on all aspects of the end-to-end environment. With machine learning based on the mobile malware detection algorithms that integrate the dynamic and static research of the identification algorithm, application software samples are collected to study sentences. Through knowledge labeling and knowledge construction, the association relationship of knowledge is extracted to realize the research of knowledge map construction. Flooding is closely correlated with the complexity of the Android mobile version of the kernel and malicious programs. A static dynamic analysis of the mobile malicious program is carried out, and the social network social diagram is constructed to model the propagation of the mobile malicious program. We extended the approach of deriving common malware behavior through graph clustering. On this basis, Android behavior analysis is performed through our virtual machine execution engine. We extend the family characteristics to the concept of DNA race genes. By studying SMS/MMS, Bluetooth, 5G base station networks, metropolitan area networks, social networks, homogeneous communities, telecommunication networks, and application market ecosystem propagation scenarios, we discovered the law of propagation. In addition, we studied the construction of the mobile Internet big data knowledge graph. Quantitative data for the main family chronology of mobile malware are obtained. We conducted detailed research and comprehensive analysis of Android application package (APK) details and behavior, relationship, resource-centric, and syntactic aspects. Furthermore, we summarized the architecture of mobile malware security analysis. We also discuss encryption of malware traffic discrimination. These precise modeling and quantified research results constitute the architecture of mobile malware analysis.
引用
收藏
页码:14576 / 14598
页数:23
相关论文
共 85 条
  • [1] Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
  • [2] The maximum common subgraph problem: Faster solutions via vertex cover
    Abu-Khzam, Faisal N.
    Samatova, Nagiza F.
    Rizk, Mohamad A.
    Langston, Michael A.
    [J]. 2007 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2007, : 367 - +
  • [3] Toward a more dependable hybrid analysis of android malware using aspect-oriented programming
    Ali-Gombe, Aisha I.
    Saltaformaggio, Brendan
    Ramanujam, J. Ram
    Xu, Dongyan
    Richard, Golden G., III
    [J]. COMPUTERS & SECURITY, 2018, 73 : 235 - 248
  • [4] Reducing the window of opportunity for Android malware Gotta catch 'em all
    Apvrille, Axelle
    Strazzere, Tim
    [J]. JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2012, 8 (1-2): : 61 - 71
  • [5] SAMADroid: A Novel 3-Level Hybrid Malware Detection Model for Android Operating System
    Arshad, Saba
    Shah, Munam A.
    Wahid, Abdul
    Mehmood, Amjad
    Song, Houbing
    Yu, Hongnian
    [J]. IEEE ACCESS, 2018, 6 : 4321 - 4339
  • [6] Au K. W. Y., 2012, P 2012 ACM C COMP CO, DOI [10.1145/2382196.2382222, DOI 10.1145/2382196.2382222]
  • [7] A Survey on Various Threats and Current State of Security in Android Platform
    Bhat, Parnika
    Dutta, Kamlesh
    [J]. ACM COMPUTING SURVEYS, 2019, 52 (01)
  • [8] Bringas P. G., 2013, PUMA PERMISSION USAG
  • [9] Bunke H, 2003, LECT NOTES COMPUT SC, V2726, P235
  • [10] DroidCat: Effective Android Malware Detection and Categorization via App-Level Profiling
    Cai, Haipeng
    Meng, Na
    Ryder, Barbara
    Yao, Daphne
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (06) : 1455 - 1470