DENDROID: A text mining approach to analyzing and classifying code structures in Android malware families

被引:157
作者
Suarez-Tangil, Guillermo [1 ]
Tapiador, Juan E. [1 ]
Pens-Lopez, Pedro [1 ]
Blasco, Jorge [1 ]
机构
[1] Univ Carlos III Madrid, Dept Comp Sci, Comp Secur COSEC Lab, Madrid 28911, Spain
关键词
Malware analysis; Software similarity and classification; Text mining; Information retrieval; Smartphones; Android OS;
D O I
10.1016/j.eswa.2013.07.106
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The rapid proliferation of smartphones over the last few years has come hand in hand with and impressive growth in the number and sophistication of malicious apps targetting smartphone users. The availability of reuse-oriented development methodologies and automated malware production tools makes exceedingly easy to produce new specimens. As a result, market operators and malware analysts are increasingly overwhelmed by the amount of newly discovered samples that must be analyzed. This situation has stimulated research in intelligent instruments to automate parts of the malware analysis process. In this paper, we introduce DENDROID, a system based on text mining and information retrieval techniques for this task. Our approach is motivated by a statistical analysis of the code structures found in a dataset of ANDROID OS malware families, which reveals some parallelisms with classical problems in those domains. We then adapt the standard Vector Space Model and reformulate the modelling process followed in text mining applications. This enables us to measure similarity between malware samples, which is then used to automatically classify them into families. We also investigate the application of hierarchical clustering over the feature vectors obtained for each malware family. The resulting dendo-grams resemble the so-called phylogenetic trees for biological species, allowing us to conjecture about evolutionary relationships among families. Our experimental results suggest that the approach is remarkably accurate and deals efficiently with large databases of malware instances. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1104 / 1117
页数:14
相关论文
共 46 条
[1]  
[Anonymous], 2012, INT C DETECTION INTR
[2]  
[Anonymous], 2012, P 10 INT C MOB SYST
[3]  
[Anonymous], 2012, Proceedings of the 19th ACM Conference on Computer and Communications Security, DOI DOI 10.1145/2382196.2382223
[4]  
[Anonymous], 2008, Mobile Malware Attacks and Defense
[5]  
[Anonymous], 2012, P 19 ANN S NETW DIST
[6]  
[Anonymous], 2012, P 2 ACM C DATA APPL, DOI DOI 10.1145/2133601.2133640
[7]  
[Anonymous], 2013, P 8 ACM SIGSAC S INF
[8]  
Cesare S., 2010, Proceedings of the Eighth Australasian Symposium on Parallel and Distributed Computing, V107, P61
[9]  
Chibelushi C., 2004, NLUCS CIT, P51
[10]  
Chin E., 2012, S US PRIV SEC