Android Malware Familial Classification Based on DEX File Section Features

被引:39
作者
Fang, Yong [1 ]
Gao, Yangchen [1 ]
Jing, Fan [1 ]
Zhang, Lei [1 ]
机构
[1] Sichuan Univ, Coll Cybersecur, Chengdu 610065, Peoples R China
关键词
Android malware family; DEX file section; multiple kernel learning; VISUALIZATION;
D O I
10.1109/ACCESS.2020.2965646
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid proliferation of Android malware is challenging the classification of the Android malware family. The traditional static method for classification is easily affected by the confusion and reinforcement, while the dynamic method is expensive in computation. To solve these problems, this paper proposes an Android malware familial classification method based on Dalvik Executable (DEX) file section features. First, the DEX file is converted into RGB (Red/Green/Blue) image and plain text respectively, and then, the color and texture of image and text are extracted as features. Finally, a feature fusion algorithm based on multiple kernel learning is used for classification. In this experiment, the Android Malware Dataset (AMD) was selected as the sample set. Two different comparative experiments were set up, and the method in this paper was compared with the common visualization method and feature fusion method. The results show that our method has a better classification effect with precision, recall and F1 score reaching 0.96. Besides, the time of feature extraction in this paper is reduced by 2.999 seconds compared with the method of frequent subsequence. In conclusion, the method proposed in this paper is efficient and precise in the classification of the Android malware family.
引用
收藏
页码:10614 / 10627
页数:14
相关论文
共 34 条
[11]  
Chen W, 2012, 2012 2ND INTERNATIONAL CONFERENCE ON APPLIED SOCIAL SCIENCE (ICASS 2012), VOL 4, P317
[12]   SUPPORT-VECTOR NETWORKS [J].
CORTES, C ;
VAPNIK, V .
MACHINE LEARNING, 1995, 20 (03) :273-297
[13]   Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis [J].
Fan, Ming ;
Liu, Jun ;
Luo, Xiapu ;
Chen, Kai ;
Tian, Zhenzhou ;
Zheng, Qinghua ;
Liu, Ting .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (08) :1890-1905
[14]   DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis [J].
Fan, Ming ;
Liu, Jun ;
Wang, Wei ;
Li, Haifei ;
Tian, Zhenzhou ;
Liu, Ting .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (08) :1772-1785
[15]   Malware Visualization for Fine-Grained Classification [J].
Fu, Jianwen ;
Xue, Jingfeng ;
Wang, Yong ;
Liu, Zhenyan ;
Shan, Chun .
IEEE ACCESS, 2018, 6 :14510-14523
[16]   Android Malware Detection based on Useful API Calls and Machine Learning [J].
Jung, Jaemin ;
Kim, Hyunjin ;
Shin, Dongjin ;
Lee, Myeonggeon ;
Lee, Hyunjae ;
Cho, Seong-je ;
Suh, Kyoungwon .
2018 IEEE FIRST INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND KNOWLEDGE ENGINEERING (AIKE), 2018, :175-178
[17]  
Kancherla K, 2013, IEEE SYM COMPUT INTE, P40, DOI 10.1109/CICYBS.2013.6597204
[18]   Extracting Android Malicious Behaviors [J].
Khanh-Huu-The Dam ;
Touili, Tayssir .
ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, :714-723
[19]  
Luo JS, 2017, IEEE INT CONF BIG DA, P4664, DOI 10.1109/BigData.2017.8258512
[20]   A Combination Method for Android Malware Detection Based on Control Flow Graphs and Machine Learning Algorithms [J].
Ma, Zhuo ;
Ge, Haoran ;
Liu, Yang ;
Zhao, Meng ;
Ma, Jianfeng .
IEEE ACCESS, 2019, 7 :21235-21245