Mining nested flow of dominant APIs for detecting android malware

被引:25
作者
Alam, Shahid [1 ]
Alharbi, Soltan Abed [2 ]
Yildirim, Serdar [1 ]
机构
[1] Adana Alparslan Turkes Sci & Technol Univ, Dept Comp Engn, Adana, Turkey
[2] Univ Jeddah, Dept Comp & Network Engn, Jeddah, Saudi Arabia
关键词
Android; Malware analysis and detection; Dominance tree; API Calls; Machine learning; FEATURES; SYSTEM;
D O I
10.1016/j.comnet.2019.107026
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
According to the Kaspersky Lab threat report, mobile malware attacks almost doubled in 2018. A study conducted in 2018 by Accenture found malware attacks to be the most expensive to resolve. Android Operating System (OS) is the most dominating platform on mobile devices. This makes Android OS susceptible to malware attacks. We need to develop new techniques and methods to stop this influx of malware attacks. In this paper, we propose a novel technique named DroidDomTree that mines the dominance tree of API (Application programming interface) calls to find similar patterns in Android applications for detecting malware. Dominance is a transitive relation. A dominance tree of API calls highlights a strong flow of path and identifies the nesting structure of APIs and hence emphasizes the importance of certain APIs in an application. It also helps in finding modules and their interaction in an application. If a malicious module is embedded in an application, then this provides strong evidence that the application contains malware. We use these properties and develop a nested model of the dominance tree of API calls and a new scheme for assigning weights to each node in the dominance tree for efficient feature selection. During 10-fold cross-validation, with eight different classifiers using real malware Android applications, DroidDomTree achieved detection rates in the range of 98.1%-99.3% and false positive rates in the range of 1.7%-0.4%. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页数:10
相关论文
共 40 条
[1]   Identifying Android malware using dynamically obtained features [J].
Afonso, Vitor Monte ;
de Amorim, Matheus Favero ;
Abed Gregio, Andre Ricardo ;
Junquera, Glauco Barroso ;
de Geus, Paulo Licio .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2015, 11 (01) :9-17
[2]  
Ahmed F, 2009, P 2 ACM WORKSH SEC A, P55, DOI [DOI 10.1145/1654988.1655003, 10.1145/1654988.1655003]
[3]  
Akcayol M. A, 2018, 2018 26 SIGNAL PROCE, P1
[4]  
Alam S., 2018, 2018 2 INT S MULTIDI, P1
[5]   DroidNative: Automating and optimizing detection of Android native code malware variants [J].
Alam, Shahid ;
Qu, Zhengyang ;
Riley, Ryan ;
Chen, Yan ;
Rastogi, Vaibhav .
COMPUTERS & SECURITY, 2017, 65 :230-246
[6]  
Alazab M., 2010, Proceedings Second Cybercrime and Trustworthy Computing Workshop (CTC 2010), P52, DOI 10.1109/CTC.2010.8
[7]  
[Anonymous], DOM TREE
[8]  
[Anonymous], P BLACK HAT ABU DHAB
[9]  
[Anonymous], P ACM SIGPLAN PROGR
[10]  
[Anonymous], KASPERSKY LAB REPORT