A survey on dynamic mobile malware detection

被引:93
作者
Yan, Ping [1 ]
Yan, Zheng [1 ,2 ]
机构
[1] Xidian Univ, Sch Cyber Engn, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
[2] Aalto Univ, Dept Commun & Networking, Espoo 02150, Finland
关键词
Mobile malware; Dynamic malware detection; Security threats; Classification algorithm; Evaluation criteria; UNWANTED TRAFFIC CONTROL; APPS;
D O I
10.1007/s11219-017-9368-4
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The outstanding advances of mobile devices stimulate their wide usage. Since mobile devices are coupled with third-party applications, lots of security and privacy problems are induced. However, current mobile malware detection and analysis technologies are still imperfect, ineffective, and incomprehensive. Due to the specific characteristics of mobile devices such as limited resources, constant network connectivity, user activities and location sensing, and local communication capability, mobile malware detection faces new challenges, especially on dynamic runtime malware detection. Many intrusions or attacks could happen after a mobile app is installed or executed. The literature still expects practical and effective dynamic malware detection approaches. In this paper, we give a thorough survey on dynamic mobile malware detection. We first introduce the definition, evolution, classification, and security threats of mobile malware. Then, we summarize a number of criteria and performance evaluation measures of mobile malware detection. Furthermore, we compare, analyze, and comment on existing mobile malware detection methods proposed in recent years based on evaluation criteria and measures. Finally, we figure out open issues in this research field and motivate future research directions.
引用
收藏
页码:891 / 919
页数:29
相关论文
共 61 条
[1]   Iterative Classifier Fusion System for the Detection of Android Malware [J].
Abawajy, Jemal H. ;
Kelarev, Andrei .
IEEE TRANSACTIONS ON BIG DATA, 2019, 5 (03) :282-292
[2]  
Alam M.S., 2013, 2013 IEEE international conference on green computing and communications and IEEE Internet of Things and IEEE cyber, physical and social computing, P663, DOI 10.1109/GreenCom-iThings-CPSCom.2013.122
[3]  
Ali A., 2014, GLOBAL INFORM INFRAS, P1
[4]   A Novel Approach to Detect Android Malware [J].
Almin, Shaikh Bushra ;
Chatterjee, Madhumita .
INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA), 2015, 45 :407-417
[5]  
Amos B, 2013, INT WIREL COMMUN, P1666, DOI 10.1109/IWCMC.2013.6583806
[6]   Detection and Identification of Android Malware Based on Information Flow Monitoring [J].
Andriatsimandefitra, Radoniaina ;
Valerie Viet Triem Tong .
2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, :200-203
[7]  
[Anonymous], ACM T MULTIMEDIA COM
[8]  
[Anonymous], MOB MALW EV 2015
[9]  
[Anonymous], MOT SEC LABS MALW RE
[10]  
[Anonymous], 2016, IT THREAT EV Q2