Android Malware Analysis Approach Based on Control Flow Graphs and Machine Learning Algorithms

被引:0
作者
Atici, Mehmet Ali [1 ]
Sagiroglu, Seref [1 ]
Dogru, Ibrahim Alper [1 ]
机构
[1] Gazi Univ, Fac Engn, Dept Comp Engn, Ankara, Turkey
来源
2016 4TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS) | 2016年
关键词
Android; mobile security; malware; static analysis; control flow graphs; machine learning;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Smart devices from smartphones to wearable computers today have been used in many purposes. These devices run various mobile operating systems like Android, iOS, Symbian, Windows Mobile, etc. Since the mobile devices are widely used and contain personal information, they are subject to security attacks by mobile malware applications. In this work we propose a new approach based on control flow graphs and machine learning algorithms for static Android malware analysis. Experimental results have shown that the proposed approach achieves a high classification accuracy of 96.26% in general and high detection rate of 99.15% for DroidKungfu malware families which are very harmful and difficult to detect because of encrypting the root exploits, by reducing data dimension significantly for real time analysis.
引用
收藏
页码:26 / 31
页数:6
相关论文
共 23 条
  • [1] Allen F. E., 1970, ACM Sigplan Notices, V5, P1, DOI DOI 10.1145/390013.808479
  • [2] Cesare S., 2010, Proceedings of the Eighth Australasian Symposium on Parallel and Distributed Computing, V107, P61
  • [3] Dini Gianluca, 2012, LNCS, P240, DOI DOI 10.1007/978-3-642-33704-8_21
  • [4] An introduction to ROC analysis
    Fawcett, Tom
    [J]. PATTERN RECOGNITION LETTERS, 2006, 27 (08) : 861 - 874
  • [5] Islam Mohammed J., 2007, 2007 International Conference on Convergence Information Technology - ICCIT '07, P1541, DOI 10.1109/ICCIT.2007.148
  • [6] APK Auditor: Permission-based Android malware detection system
    Kabakus, Abdullah Talha
    Alper, Dogru Ibrahim
    Aydin, Cetin
    [J]. DIGITAL INVESTIGATION, 2015, 13 : 1 - 14
  • [7] MODELZ: Monitoring, Detection, and Analysis of Energy-Greedy Anomalies in Mobile Handsets
    Kim, Hahnsang
    Shin, Kang G.
    Pillai, Padmanabhan
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2011, 10 (07) : 968 - 981
  • [8] Liang S, 2014, IEEE ICC, P2301, DOI 10.1109/ICC.2014.6883666
  • [9] Liu W, 2013, INT CONF MACH LEARN, P57, DOI 10.1109/ICMLC.2013.6890444
  • [10] Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
    Rastogi, Vaibhav
    Chen, Yan
    Jiang, Xuxian
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (01) : 99 - 108