Android Malware Detection Using TCN with Bytecode Image

被引:45
作者
Zhang, Wenhui [1 ]
Luktarhan, Nurbol [1 ]
Ding, Chao [1 ]
Lu, Bei [1 ]
机构
[1] Xinjiang Univ, Coll Informat Sci & Engn, Urumqi, Peoples R China
来源
SYMMETRY-BASEL | 2021年 / 13卷 / 07期
基金
中国国家自然科学基金;
关键词
Android malware detection; TCN; XML file; data section; bytecode image;
D O I
10.3390/sym13071107
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
With the rapid increase in the number of Android malware, the image-based analysis method has become an effective way to defend against symmetric encryption and confusing malware. At present, the existing Android malware bytecode image detection method, based on a convolution neural network (CNN), relies on a single DEX file feature and requires a large amount of computation. To solve these problems, we combine the visual features of the XML file with the data section of the DEX file for the first time, and propose a new Android malware detection model, based on a temporal convolution network (TCN). First, four gray-scale image datasets with four different combinations of texture features are created by combining XML files and DEX files. Then the image size is unified and input to the designed neural network with three different convolution methods for experimental validation. The experimental results show that adding XML files is beneficial for Android malware detection. The detection accuracy of the TCN model is 95.44%, precision is 95.45%, recall rate is 95.45%, and F1-Score is 95.44%. Compared with other methods based on the traditional CNN model or lightweight MobileNetV2 model, the method proposed in this paper, based on the TCN model, can effectively utilize bytecode image sequence features, improve the accuracy of detecting Android malware and reduce its computation.
引用
收藏
页数:20
相关论文
共 26 条
[11]   Android Malware Detection using Convolutional Neural Networks and Data Section Images [J].
Jung, Jaemin ;
Choi, Jongmoo ;
Cho, Seong-je ;
Han, Sangchul ;
Park, Minkyu ;
Hwang, Youngsup .
PROCEEDINGS OF THE 2018 CONFERENCE ON RESEARCH IN ADAPTIVE AND CONVERGENT SYSTEMS (RACS 2018), 2018, :149-153
[12]   Two Anatomists Are Better than One-Dual-Level Android Malware Detection [J].
Kouliaridis, Vasileios ;
Kambourakis, Georgios ;
Geneiatakis, Dimitris ;
Potha, Nektaria .
SYMMETRY-BASEL, 2020, 12 (07)
[13]  
Kumar A., 2016, P 2016 10 INT C INT, P16
[14]   Deep Android Malware Detection [J].
McLaughlin, Niall ;
del Rincon, Jesus Martinez ;
Kang, BooJoong ;
Yerima, Suleiman ;
Miller, Paul ;
Sezer, Sakir ;
Safaei, Yeganeh ;
Trickel, Erik ;
Zhao, Ziming ;
Doup, Adam ;
Ahn, Gail Joon .
PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, :301-308
[15]  
Nataraj L., 2011, P 8 INT S VIS CYB SE, DOI DOI 10.1145/2016904.2016908
[16]  
National Internet Emergency Center, OV CHIN INT NETW SEC
[17]  
Naway A., 2020, ARXIV181210360
[18]   Modeling the shape of the scene: A holistic representation of the spatial envelope [J].
Oliva, A ;
Torralba, A .
INTERNATIONAL JOURNAL OF COMPUTER VISION, 2001, 42 (03) :145-175
[19]  
Orralba A., 2003, P INT C COMP VIS ICC
[20]   Future developments in standardisation of cyber risk in the Internet of Things (IoT) [J].
Radanliev, Petar ;
De Roure, David C. ;
Nurse, Jason R. C. ;
Montalvo, Rafael Mantilla ;
Cannady, Stacy ;
Santos, Omar ;
Maddox, La'Treall ;
Burnap, Peter ;
Maple, Carsten .
SN APPLIED SCIENCES, 2020, 2 (02)