"Andromaly": a behavioral malware detection framework for android devices

被引:433
作者
Shabtai, Asaf [1 ]
Kanonov, Uri [1 ]
Elovici, Yuval [1 ]
Glezer, Chanan [1 ]
Weiss, Yael [1 ]
机构
[1] Ben Gurion Univ Negev, Dept Informat Syst Engn, Deutsch Telekom Labs, IL-84105 Beer Sheva, Israel
关键词
Mobile devices; Machine learning; Malware; Security; Android; MOBILE; CLASSIFICATION;
D O I
10.1007/s10844-010-0148-x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This article presents Andromaly-a framework for detecting malware on Android mobile devices. The proposed framework realizes a Host-based Malware Detection System that continuously monitors various features and events obtained from the mobile device and then applies Machine Learning anomaly detectors to classify the collected data as normal (benign) or abnormal (malicious). Since no malicious applications are yet available for Android, we developed four malicious applications, and evaluated Andromaly's ability to detect new malware based on samples of known malware. We evaluated several combinations of anomaly detection algorithms, feature selection method and the number of top features in order to find the combination that yields the best performance in detecting new malware on Android. Empirical results suggest that the proposed framework is effective in detecting malware on mobile devices in general and on Android in particular.
引用
收藏
页码:161 / 190
页数:30
相关论文
共 59 条
[51]  
Shabtai A., 2009, 25 ANN COMP SEC APPL
[52]  
Shabtai A., 2009, INFORM SECURITY TECH, V14, P16, DOI [DOI 10.1016/j.istr.2009.03.003, DOI 10.1016/J.ISTR.2009.03.003]
[53]   Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method [J].
Shabtai, Asaf ;
Kanonov, Uri ;
Elovici, Yuval .
JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (08) :1524-1537
[54]   Google Android: A Comprehensive Security Assessment [J].
Shabtai, Asaf ;
Fledel, Yuval ;
Kanonov, Uri ;
Elovici, Yuval ;
Dolev, Shlomi ;
Glezer, Chanan .
IEEE SECURITY & PRIVACY, 2010, 8 (02) :35-44
[55]  
SHANNON CE, 1948, BELL SYST TECH J, V27, P379, DOI DOI 10.1002/J.1538-7305.1948.TB01338.X
[56]   Security aspects of mobile phone virus: a critical survey [J].
Shih, Dong-Her ;
Lin, Binshan ;
Chiang, Hslu-Sen ;
Shih, Ming-Hung .
INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2008, 108 (3-4) :478-494
[57]  
Wenke Lee, 2002, Journal of Computer Security, V10, P5
[58]  
Yap TS, 2005, LECT NOTES COMPUT SC, V3597, P57
[59]  
Yin H, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P116