On the Efficacy of Static Features to Detect Malicious Applications in Android

被引:1
作者
Geneiatakis, Dimitris [1 ]
Satta, Riccardo [2 ]
Fovino, Igor Nai [2 ]
Neisse, Ricardo [2 ]
机构
[1] Aristotle Univ Thessaloniki, Elect & Comp Engn Dept, GR-54124 Thessaloniki, Greece
[2] Commiss European Communities, Joint Res Ctr JRC, Inst Protect & Secur Citizen IPSC, I-21027 Ispra, Italy
来源
TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS | 2015年 / 9264卷
关键词
MALWARE DETECTION;
D O I
10.1007/978-3-319-22906-5_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Android OS environment is today increasingly targeted by malwares. Traditional signature based detection algorithms are not able to provide complete protection especially against ad-hoc created malwares. In this paper, we present a feasibility analysis for enhancing the detection accuracy on Android malware for approaches relying on machine learning classifiers and Android applications' static features. Specifically, our study builds on the basis of machine learning classifiers operating over different fusion rules on Android applications' permissions and APIs. We analyse the performance of different configurations in terms of false alarms tradeoff. Results demonstrate that malware detection accuracy could be enhanced in case that detection approaches introduce additional fusion rules e.g., squared average score over the examined features.
引用
收藏
页码:87 / 98
页数:12
相关论文
共 31 条
  • [1] Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
  • [2] AN INTRODUCTION TO KERNEL AND NEAREST-NEIGHBOR NONPARAMETRIC REGRESSION
    ALTMAN, NS
    [J]. AMERICAN STATISTICIAN, 1992, 46 (03) : 175 - 185
  • [3] [Anonymous], 2012, P 10 INT C MOB SYST
  • [4] [Anonymous], 2013, WORLDW SMARTPH OS MA
  • [5] [Anonymous], 2014, 21 ANN NETW DISTR SY
  • [6] A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android
    Barrera, David
    Kayacik, H. Guenes
    van Oorschot, P. C.
    Somayaji, Anil
    [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 73 - 84
  • [7] Bartkowiak A, 2012, FED CONF COMPUT SCI, P27
  • [8] A tutorial on Support Vector Machines for pattern recognition
    Burges, CJC
    [J]. DATA MINING AND KNOWLEDGE DISCOVERY, 1998, 2 (02) : 121 - 167
  • [9] Felt AP, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P627
  • [10] Felt AdriennePorter., 2011, P 2 USENIX C WEB APP, P7