Android Malware Detection Based on Machine Learning

被引:1
作者
Wang, Qing-Fei [1 ]
Fang, Xiang [1 ]
机构
[1] Hubei Univ Med, Sch Publ Hlth & Management, Shiyan, Peoples R China
来源
2018 4TH ANNUAL INTERNATIONAL CONFERENCE ON NETWORK AND INFORMATION SYSTEMS FOR COMPUTERS (ICNISC 2018) | 2018年
关键词
Android malware; machine learning; static analysis; dynamic analysis;
D O I
10.1109/ICNISC.2018.00094
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Among various mobile terminals, Android system is widely favored by users because of its open platform, rich software content and services. At the same time, Android malware is also emerging for the purpose of obtaining improper profits, which brings serious security problems to the Android platform. Therefore, effective security mechanism needs to be proposed to detect malicious software. This paper is based on Android system and machine learning technology. It detects Android malware from two aspects of static analysis and dynamic analysis.
引用
收藏
页码:434 / 436
页数:3
相关论文
共 10 条
[1]   A detection method and system implementation for Android malware [J].
Hu, Wenjun ;
Zhao, Shuang ;
Tao, Jing ;
Ma, Xiaobo ;
Chen, Liang .
Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2013, 47 (10) :37-43
[2]   Machine Learning for Android Malware Detection Using Permission and API Calls [J].
Peiravian, Naser ;
Zhu, Xingquan .
2013 IEEE 25TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI), 2013, :300-305
[3]  
Shabtai A, 2011, INT C COMP INT SEC, P329
[4]   "Andromaly": a behavioral malware detection framework for android devices [J].
Shabtai, Asaf ;
Kanonov, Uri ;
Elovici, Yuval ;
Glezer, Chanan ;
Weiss, Yael .
JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2012, 38 (01) :161-190
[5]  
Xie Y. L, 2017, RES MALWARE DETECTIO
[6]  
Xu Y. P., 2017, RES ANDROID MALWARE
[7]  
Zhao M., 2012, J NETWROKS, V7
[8]  
Zheng Y, 2014, SCI TECHNOLOGY INFOR, V17, P223
[9]  
Zhou Y., 2012, P NETWORK DISTRIBUTE
[10]   Dissecting Android Malware: Characterization and Evolution [J].
Zhou, Yajin ;
Jiang, Xuxian .
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, :95-109