"Andromaly": a behavioral malware detection framework for android devices

被引:433
作者
Shabtai, Asaf [1 ]
Kanonov, Uri [1 ]
Elovici, Yuval [1 ]
Glezer, Chanan [1 ]
Weiss, Yael [1 ]
机构
[1] Ben Gurion Univ Negev, Dept Informat Syst Engn, Deutsch Telekom Labs, IL-84105 Beer Sheva, Israel
关键词
Mobile devices; Machine learning; Malware; Security; Android; MOBILE; CLASSIFICATION;
D O I
10.1007/s10844-010-0148-x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This article presents Andromaly-a framework for detecting malware on Android mobile devices. The proposed framework realizes a Host-based Malware Detection System that continuously monitors various features and events obtained from the mobile device and then applies Machine Learning anomaly detectors to classify the collected data as normal (benign) or abnormal (malicious). Since no malicious applications are yet available for Android, we developed four malicious applications, and evaluated Andromaly's ability to detect new malware based on samples of known malware. We evaluated several combinations of anomaly detection algorithms, feature selection method and the number of top features in order to find the combination that yields the best performance in detecting new malware on Android. Empirical results suggest that the proposed framework is effective in detecting malware on mobile devices in general and on Android in particular.
引用
收藏
页码:161 / 190
页数:30
相关论文
共 59 条
[1]  
Adam P. F., 2009, IEEE S SEC PRIV
[2]  
[Anonymous], P AAAI 93 WORKSH KNO
[3]  
[Anonymous], IEEE ELECT SYST SOFT
[4]  
[Anonymous], 2008, PROC 41 ANN HAWAII I, DOI [10.1109/HICSS.2008.319, DOI 10.1109/HICSS.2008.319]
[5]  
[Anonymous], ARTIFICIAL INTELLIGE
[6]  
[Anonymous], P 12 INT S REC ADV I
[7]  
[Anonymous], ABS09125101 CORR
[8]  
[Anonymous], PERV COMP COMM WORKS
[9]  
[Anonymous], NASTR00942008 PENNS
[10]  
Bose A., 2008, P 6 INT C MOB SYST A