A DEEP FEATURE FUSION METHOD FOR ANDROID MALWARE DETECTION

被引:9
作者
Ding, Yuxin [1 ]
Hu, Jieke [1 ]
Xu, Wenting [1 ]
Zhang, Xiao [1 ]
机构
[1] Harbin Inst Technol Shenzhen, Shenzhen 518005, Peoples R China
来源
PROCEEDINGS OF 2019 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC) | 2019年
基金
中国国家自然科学基金;
关键词
Convolutional neural network; Malware; Android; behavioral fusion; Opcode; BEHAVIOR;
D O I
10.1109/icmlc48188.2019.8949298
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, there is a rapid increase in the number of Android based malware. To protect users from malware attacks, different malware detection methods are proposed. In this paper, a novel static method is proposed to detect malware. We use the static analysis technique to analyze the Android applications and obtain their static behaviors. Two kinds of behaviors are extracted to represent malware. One kind of behaviors is the function call graph and the other kind is opcode sequences. To automatically learn behavioral features, we convert the function call graphs and opcode sequences into two dimensional data, and use deep learning method to build malware classifier. To further improve the performance of the malware classifier, a deep feature fusion model is proposed, which can combine different behavioral features for malware classification. The experimental results show the deep learning method is effective to detect malware and the proposed fusion model outperforms the single behavioral model.
引用
收藏
页码:547 / 552
页数:6
相关论文
共 14 条
[1]  
[Anonymous], LECT NOTES I COMPUTE
[2]  
[Anonymous], DAPASA DETECTINGANDR
[3]  
Chan PPK, 2014, INT CONF MACH LEARN, P82, DOI 10.1109/ICMLC.2014.7009096
[4]   A malware detection method based on family behavior graph [J].
Ding, Yuxin ;
Xia, Xiaoling ;
Chen, Sheng ;
Li, Ye .
COMPUTERS & SECURITY, 2018, 73 :73-86
[5]  
Enck W, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P235
[6]   A Novel Approach to Detect Malware Based on API Call Sequence Analysis [J].
Ki, Youngjoon ;
Kim, Eunjin ;
Kim, Huy Kang .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
[7]   Security importance assessment for system objects and malware detection [J].
Mao, Weixuan ;
Cai, Zhongmin ;
Towsley, Don ;
Feng, Qian ;
Guan, Xiaohong .
COMPUTERS & SECURITY, 2017, 68 :47-68
[8]   AMAL: High-fidelity, behavior-based automated malware analysis and classification [J].
Mohaisen, Aziz ;
Alrawi, Omar ;
Mohaisen, Manar .
COMPUTERS & SECURITY, 2015, 52 :251-266
[9]   Evaluation of machine learning classifiers for mobile malware detection [J].
Narudin, Fairuz Amalina ;
Feizollah, Ali ;
Anuar, Nor Badrul ;
Gani, Abdullah .
SOFT COMPUTING, 2016, 20 (01) :343-357
[10]   Machine Learning for Android Malware Detection Using Permission and API Calls [J].
Peiravian, Naser ;
Zhu, Xingquan .
2013 IEEE 25TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI), 2013, :300-305