Lightweight, Effective Detection and Characterization of Mobile Malware Families

被引:12
作者
Elish, Karim O. [1 ]
Elish, Mahmoud O. [2 ]
Almohri, Hussain M. J. [3 ]
机构
[1] Florida Polytech Univ, Dept Comp Sci, Lakeland, FL 33805 USA
[2] Gulf Univ Sci & Technol, Comp Sci Dept, Hawally 32093, Kuwait
[3] Kuwait Univ, Dept Comp Sci, Safat 13060, Kuwait
关键词
Malware; Feature extraction; Codes; Measurement; Static analysis; Smart phones; Electronic mail; Android; malware; code metrics; classification; static analysis; ANDROID MALWARE;
D O I
10.1109/TC.2022.3143439
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Android malware is an ongoing threat to billions of smart devices' security, ranging from mobile phones to car infotainment systems. Despite numerous approaches and previous studies to develop solutions for detecting and preventing Android malware, the rapid continuous development of new malware variants requires a careful reconsideration and the development of effective methods to identify malware families given a meager number of malware instances. In this paper, we present DroidMalVet, a novel Android malware family classification and detection approach that does not require to perform complex program analyses or utilize large feature sets. DroidMalVet is the first to use a promising, diverse, and small set of software metrics as features in a supervised learning platform to classify and detect various Android malware families. Our extensive empirical evaluations on two large public malware datasets show that DroidMalVet accurately detects both small and large malware families with F-Score accuracy of 94.4% and 96%, and AUC equal to 99.5% and 99.7% on the malware families in Drebin and AMD datasets, respectively. Moreover, our results demonstrate the superior performance of DroidMalVet in detecting small families (i.e., families with few samples). DroidMalVet complements existing approaches and presents an early warning tool for detecting known and emerging malware families.
引用
收藏
页码:2982 / 2995
页数:14
相关论文
共 45 条
[1]  
Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
[2]   A Machine Learning Approach to Improve the Detection of CI Skip Commits [J].
Abdalkareem, Rabe ;
Mujahid, Suhaib ;
Shihab, Emad .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2021, 47 (12) :2740-2754
[3]  
[Anonymous], 2014, Drebin Dataset
[4]  
[Anonymous], 2016, 2016 INT S SOFTW TES, DOI DOI 10.1145/2931037
[5]  
[Anonymous], 2020, McAfee Mobile Threat Report
[6]  
[Anonymous], 2010, 9 USENIX S OP SYST D, DOI DOI 10.1145/2494522
[7]  
Aresu M, 2015, 2015 10TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), P128, DOI 10.1109/MALWARE.2015.7413693
[8]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[9]  
Battista Pasquale, 2016, ICISSP 2016. 2nd International Conference on Information Systems Security and Privacy. Proceedings, P542
[10]   DESIGN FOR TESTABILITY IN OBJECT-ORIENTED SYSTEMS [J].
BINDER, RV .
COMMUNICATIONS OF THE ACM, 1994, 37 (09) :87-101