Machine Learning for Android Malware Detection Using Permission and API Calls

被引:216
作者
Peiravian, Naser [1 ]
Zhu, Xingquan [1 ]
机构
[1] Florida Atlantic Univ, Dept Comp & Elect Engn & Comp Sci, Boca Raton, FL 33431 USA
来源
2013 IEEE 25TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI) | 2013年
关键词
Malware detection; Android; Permissions; API calls; Smartphone Security;
D O I
10.1109/ICTAI.2013.53
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Google Android mobile phone platform is one of the most anticipated smartphone operating systems on the market. The open source Android platform allows developers to take full advantage of the mobile operation system, but also raises significant issues related to malicious applications (Apps). On one hand, the popularity of Android absorbs attention of most developers for producing their applications on this platform. The increased numbers of applications, on the other hand, prepares a suitable prone for some users to develop different kinds of malware and insert them in Google Android market or other third party markets as safe applications. In this paper, we propose to combine permission and API (Application Program Interface) calls and use machine learning methods to detect malicious Android Apps. In our design, the permission is extracted from each App's profile information and the APIs are extracted from the packed App file by using packages and classes to represent API calls. By using permissions and API calls as features to characterize each Apps, we can learn a classifier to identify whether an App is potentially malicious or not. An inherent advantage of our method is that it does not need to involve any dynamical tracing of the system calls but only uses simple static analysis to find system functions involved in each App. In addition, because permission settings and APIs are always available for each App, our method can be generalized to all mobile applications. Experiments on real-world Apps with more than 1200 malware and 1200 benign samples validate the algorithm performance.
引用
收藏
页码:300 / 305
页数:6
相关论文
共 18 条
  • [1] [Anonymous], 1993, An introduction to the bootstrap
  • [2] [Anonymous], SEC PRIV SP 2012 IEE
  • [3] [Anonymous], 2014, C4. 5: programs for machine learning
  • [4] [Anonymous], P 1 ACM WORKSH SEC P
  • [5] [Anonymous], 2000, NATURE STAT LEARNING, DOI DOI 10.1007/978-1-4757-3264-1
  • [6] Batista Gustavo EAPA, 2004, ACM SIGKDD Explorations Newsletter
  • [7] Breiman L, 1996, MACHINE LEARNING, V26
  • [8] Christodorescu M., 2003, 12 USENIX SEC S
  • [9] Garner S., P 1995 NZ COMP SCI R
  • [10] vEye: behavioral footprinting for self-propagating worm detection and profiling
    Jiang, Xuxian
    Zhu, Xingquan
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2009, 18 (02) : 231 - 262