A Novel Dynamic Android Malware Detection System With Ensemble Learning

被引:125
作者
Feng, Pengbin [1 ,2 ]
Ma, Jianfeng [1 ]
Sun, Cong [1 ]
Xu, Xinpeng [2 ]
Ma, Yuwan [2 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Shaanxi, Peoples R China
[2] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Shaanxi, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Android security; dynamic analysis; ensemble learning; Android malware detection;
D O I
10.1109/ACCESS.2018.2844349
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularity of Android smartphones, malicious applications targeted Android platform have explosively increased. Proposing effective Android malware detection method for preventing the spread of malware has become an emerging issue. Various features extracted through static and dynamic analysis in conjunction with machine learning algorithm have been the mainstream in large-scale malware identification. In general, static analysis becomes invalid in detecting applications which adopt sophisticated obfuscation techniques like encryption or dynamic code loading. However, dynamic analysis is suitable to deal with these evasion techniques. In this paper, we propose an effective dynamic analysis framework, called EnDroid, in the aim of implementing highly precise malware detection based on multiple types of dynamic behavior features. These features cover system-level behavior trace and common application-level malicious behaviors like personal information stealing, premium service subscription, and malicious service communication. In addition, EnDroid adopts feature selection algorithm to remove noisy or irrelevant features and extracts critical behavior features. Extracting behavior features through runtime monitor, EnDroid is able to distinguish malicious from benign applications with ensemble learning algorithm. Through experiments, we prove the effectiveness of EnDroid on two datasets. Furthermore, we find Stacking achieves the best classification performance and is promising in Android malware detection.
引用
收藏
页码:30996 / 31011
页数:16
相关论文
共 34 条
[1]  
Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
[2]  
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1145/2901739.2903508, 10.1109/MSR.2016.056]
[3]   Empirical assessment of machine learning-based malware detectors for Android Measuring the gap between in-the-lab and in-the-wild validation scenarios [J].
Allix, Kevin ;
Bissyande, Tegawende F. ;
Jerome, Quentin ;
Klein, Jacques ;
State, Radu ;
Le Traon, Yves .
EMPIRICAL SOFTWARE ENGINEERING, 2016, 21 (01) :183-211
[4]  
[Anonymous], 2011, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
[5]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[6]  
Chen L., 2017, SEMISUPERVISED CLASS
[7]   Evaluation of Android Malware Detection Based on System Calls [J].
Dimjasevic, Marko ;
Atzeni, Simone ;
Rakamaric, Zvonimir ;
Ugrina, Ivo .
IWSPA'16: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, 2016, :1-8
[8]   TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones [J].
Enck, William ;
Gilbert, Peter ;
Han, Seungyeop ;
Tendulkar, Vasant ;
Chun, Byung-Gon ;
Cox, Landon P. ;
Jung, Jaeyeon ;
McDaniel, Patrick ;
Sheth, Anmol N. .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2014, 32 (02)
[9]  
Fengguo Wei, 2017, Detection of Intrusions and Malware, and Vulnerability Assessment. 14th International Conference, DIMVA 2017. Proceedings: LNCS 10327, P252, DOI 10.1007/978-3-319-60876-1_12
[10]   Lightweight, Obfuscation-Resilient Detection and Family Identification of Android Malware [J].
Garcia, Joshua ;
Hammad, Mahmoud ;
Malek, Sam .
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2018, 26 (03)