Service-oriented mobile malware detection system based on mining strategies

被引:13
作者
Cui, Baojiang [1 ,2 ]
Jin, Haifeng [1 ,2 ]
Carullo, Giuliana [3 ]
Liu, Zheli [4 ,5 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Comp Sci, Beijing 100088, Peoples R China
[2] Natl Engn Lab Mobile Network Secur, Beijing, Peoples R China
[3] Univ Salerno, Dept Comp Sci, I-84100 Salerno, Italy
[4] Nankai Univ, Coll Informat Tech Sci, Dept Comp & Informat Secur, Tianjin 300071, Peoples R China
[5] Fujian Normal Univ, Key Lab Network Secur & Cryptol, Fuzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
Malware detection; Data mining; Mobile internet; Contraction clustering; SMMDS; SECURITY;
D O I
10.1016/j.pmcj.2015.06.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The large number of mobile internet users has highlighted the importance of privacy protection. Traditional malware detection systems that run within mobile devices have numerous disadvantages, such as overconsumption of processing resources, delayed updating, and difficulty in intersection. This study proposed a novel detection system based on cloud computing and packet analysis. The system detects the malicious behavior of the mobile malwares through their packets with the use of data mining methods. This approach completely avoids the defects of traditional methods. The system is service-oriented and can be deployed by mobile operators to send alarms to users who have malwares on their devices. To improve system performance, a new clustering strategy called contraction clustering was created. This strategy uses prior knowledge to reduce dataset size. Moreover, a multi-module detection scheme was introduced to enhance system accuracy. The results of this scheme are produced by integrating the detection results of several algorithms, including Naive Bayes and Decision Tree. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:101 / 116
页数:16
相关论文
共 34 条
[1]  
[Anonymous], 2011, NDSS
[2]  
[Anonymous], ACM CCS WORM
[3]  
[Anonymous], 2012, ANDROID SECURITY
[4]  
[Anonymous], CONTRACTION CLUSTERI
[5]  
[Anonymous], 2013, NDSS
[6]  
[Anonymous], 2009, NDSS
[7]  
[Anonymous], 2009, Hadoop: The Definitive Guide
[8]  
[Anonymous], P 20 ACM SIGSOFT INT
[9]  
[Anonymous], 2011, SIAM INT C DAT MIN
[10]  
Bickford Jeffrey, 2011, P 9 INT C MOB SYST A, P225