Methods to Select Features for Android Malware Detection Based on the Protection Level Analysis

被引:1
作者
Lee, Chaeeun [1 ]
Ko, Eunnarae [1 ]
Lee, Kyungho [1 ]
机构
[1] Korea Univ, Inst Cyber Secur & Privacy ICSP, Seoul 02841, South Korea
来源
INFORMATION SECURITY APPLICATIONS, WISA 2020 | 2020年 / 12583卷
关键词
Android application; Permission; Protection level; Malware detection; Feature selection; Classification; Deep learning;
D O I
10.1007/978-3-030-65299-9_28
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Android's permission system is asked to users before installing applications. It is intended to warn users about the risks of the app installation and gives users opportunities to review the application's permission requests and uninstall it if they find it threatening. However, not all android permissions ask for the user's decision. Those who are defined as 'Dangerous' in the permission protection level are only being confirmed by the users in Android Google Market. We examine whether the 'Dangerous permissions' are actually being a main component of detection when it comes to defining the app as malicious or benign. To collect important features and to investigate the correlation between the malicious app and the permission's protection level, feature selection and deep learning algorithms were used. The study evaluates the feature by using the confusion matrix. We used 10,818 numbers of malicious and benign applications, and 457 permission lists to investigate our examination, and it appeared that 'Dangerous' permissions may not be the only important factor, and we suggest a different perspective of viewing permissions.
引用
收藏
页码:375 / 386
页数:12
相关论文
共 18 条
  • [1] A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android
    Barrera, David
    Kayacik, H. Guenes
    van Oorschot, P. C.
    Somayaji, Anil
    [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 73 - 84
  • [2] Chin E, 2011, P 9 INT C MOBILE SYS, P239, DOI DOI 10.1145/1999995.2000018
  • [3] Das S., 2001, P 18 INT C MACHINE L, P74, DOI DOI 10.5555/645530.658297
  • [4] Enck W, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P235
  • [5] Understanding Android Security
    Enck, William
    Ongtang, Machigair
    McDaniel, Patrick
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (01) : 50 - 57
  • [6] Felt A.P., 2012, P 8 S US PRIV SEC WA, P1, DOI [10.1145/2335356.2335360, DOI 10.1145/2335356.2335360]
  • [7] Felt Adrienne Porter, 2011, P 1 ACM WORKSH SEC P, P3, DOI DOI 10.1145/2046614.2046618
  • [8] Research on collaborative negotiation for e-commerce.
    Feng, YQ
    Lei, Y
    Li, Y
    Cao, RZ
    [J]. 2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 2085 - 2088
  • [9] Frank E, 2010, DATA MINING AND KNOWLEDGE DISCOVERY HANDBOOK, SECOND EDITION, P1269, DOI 10.1007/978-0-387-09823-4_66
  • [10] Hall M., 2009, SIGKDD EXPLORATIONS, V11, P10, DOI DOI 10.1145/1656274.1656278