DroidDeep: using Deep Belief Network to characterize and detect android malware

被引:14
作者
Su, Xin [1 ,2 ]
Shi, Weiqi [1 ]
Qu, Xilong [3 ]
Zheng, Yi [4 ]
Liu, Xuchong [1 ]
机构
[1] Hunan Police Acad, Hunan Prov Key Lab Network Invest Technol, Changsha, Peoples R China
[2] Hunan Police Acad, Dept Informat Technol, Changsha, Peoples R China
[3] Hunan Univ Finance & Econ, Sch Informat Technol & Management, Changsha, Peoples R China
[4] Zhejiang Econ Informat Ctr, Hangzhou, Peoples R China
关键词
Android malicious app; Deep Belief Network; Static analysis; Behavioral characteristics;
D O I
10.1007/s00500-019-04589-w
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Android operating system and corresponding applications (app) are becoming increasingly popular, because the characteristics (open source, support the third-party app markets, etc.) of the Android platform, which cause the amazing pace of Android malware, poses a great threat to this platform. To solve this security issue, a comprehensive and accurate detection approach should be designed. Many research works dedicate to achieve this goal, including code analysis and machine learning methods, but these kinds of works cannot analyze large amount of Android applications comprehensively and effectively. We propose DroidDeep, which uses a Deep Belief Network model to classify Android malicious app. This proposed approach first collects 11 different kinds of static behavioral characteristics from a large amount of Android applications. Second, we design a Deep Belief Network algorithm to select unique behavioral characteristics from the collected static behavioral characteristics. Third, we detect zero-day Android malicious applications based on selected behavioral characteristics. We choose a dataset which mix with Android benign and malicious applications to evaluate the proposed method. The laboratory results show that the proposed method can obtain a higher detection accuracy (99.4%). Moreover, the proposed approach costs 6 s in average when analyzing and detecting each Android application.
引用
收藏
页码:6017 / 6030
页数:14
相关论文
共 42 条
[1]  
Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
[2]  
[Anonymous], 2012, SECURITY 12
[3]  
[Anonymous], INFORM COMMUNICATION
[4]  
[Anonymous], INT J DISTRIBUTED SE
[5]  
[Anonymous], C TRUST SEC PRIV COM
[6]   SAMADroid: A Novel 3-Level Hybrid Malware Detection Model for Android Operating System [J].
Arshad, Saba ;
Shah, Munam A. ;
Wahid, Abdul ;
Mehmood, Amjad ;
Song, Houbing ;
Yu, Hongnian .
IEEE ACCESS, 2018, 6 :4321-4339
[7]  
Au K. W. Y., 2012, P 2012 ACM C COMP CO, DOI [10.1145/2382196.2382222, DOI 10.1145/2382196.2382222]
[8]  
Bengio Y., 2007, Advances in Neural Information Processing Systems, V19, P153, DOI DOI 10.5555/2976456.2976476
[9]   Learning Deep Architectures for AI [J].
Bengio, Yoshua .
FOUNDATIONS AND TRENDS IN MACHINE LEARNING, 2009, 2 (01) :1-127
[10]  
Burguera I., 2011, P 1 ACM WORKSH SEC P, P15, DOI DOI 10.1145/2046614.2046619