Android Malware Detection Using TCN with Bytecode Image

被引:45
作者
Zhang, Wenhui [1 ]
Luktarhan, Nurbol [1 ]
Ding, Chao [1 ]
Lu, Bei [1 ]
机构
[1] Xinjiang Univ, Coll Informat Sci & Engn, Urumqi, Peoples R China
来源
SYMMETRY-BASEL | 2021年 / 13卷 / 07期
基金
中国国家自然科学基金;
关键词
Android malware detection; TCN; XML file; data section; bytecode image;
D O I
10.3390/sym13071107
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
With the rapid increase in the number of Android malware, the image-based analysis method has become an effective way to defend against symmetric encryption and confusing malware. At present, the existing Android malware bytecode image detection method, based on a convolution neural network (CNN), relies on a single DEX file feature and requires a large amount of computation. To solve these problems, we combine the visual features of the XML file with the data section of the DEX file for the first time, and propose a new Android malware detection model, based on a temporal convolution network (TCN). First, four gray-scale image datasets with four different combinations of texture features are created by combining XML files and DEX files. Then the image size is unified and input to the designed neural network with three different convolution methods for experimental validation. The experimental results show that adding XML files is beneficial for Android malware detection. The detection accuracy of the TCN model is 95.44%, precision is 95.45%, recall rate is 95.45%, and F1-Score is 95.44%. Compared with other methods based on the traditional CNN model or lightweight MobileNetV2 model, the method proposed in this paper, based on the TCN model, can effectively utilize bytecode image sequence features, improve the accuracy of detecting Android malware and reduce its computation.
引用
收藏
页数:20
相关论文
共 26 条
[1]   Identifying Android malware using dynamically obtained features [J].
Afonso, Vitor Monte ;
de Amorim, Matheus Favero ;
Abed Gregio, Andre Ricardo ;
Junquera, Glauco Barroso ;
de Geus, Paulo Licio .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2015, 11 (01) :9-17
[2]   SAMADroid: A Novel 3-Level Hybrid Malware Detection Model for Android Operating System [J].
Arshad, Saba ;
Shah, Munam A. ;
Wahid, Abdul ;
Mehmood, Amjad ;
Song, Houbing ;
Yu, Hongnian .
IEEE ACCESS, 2018, 6 :4321-4339
[3]  
Bagheri Hamid, 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Proceedings, P514, DOI 10.1109/DSN.2016.53
[4]  
Bai S, ARXIV
[5]  
Darus FM, 2018, PROCEEDINGS OF THE 2018 CYBER RESILIENCE CONFERENCE (CRC)
[6]  
Ding YX, 2018, INT CONF MACH LEARN, P331, DOI 10.1109/ICMLC.2018.8526935
[7]   Android malware detection method based on bytecode image [J].
Ding, Yuxin ;
Zhang, Xiao ;
Hu, Jieke ;
Xu, Wenting .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 14 (5) :6401-6410
[8]   CNN-based Android Malware Detection [J].
Ganesh, Meenu ;
Pednekar, Priyanka ;
Prabhuswamy, Pooja ;
Nair, Divyashri Sreedharan ;
Park, Younghee ;
Jeon, Hyeran .
PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND ASSURANCE (ICSSA), 2017, :60-65
[9]  
Hsien-De Huang T, 2018, IEEE INT CONF BIG DA, P2633, DOI 10.1109/BigData.2018.8622324
[10]   ImageDetox: Method for the Neutralization of Malicious Code Hidden in Image Files [J].
Jung, Dong-Seob ;
Lee, Sang-Joon ;
Euom, Ieck-Chae .
SYMMETRY-BASEL, 2020, 12 (10) :1-18