Key features for the characterization of Android malware families

被引:9
作者
Sedano, Javier [1 ]
Gonzalez, Silvia [1 ]
Chira, Camelia [2 ]
Herrero, Alvaro [3 ]
Corchado, Emilio [4 ]
Ramon Villar, Jose [5 ]
机构
[1] Inst Tecnol Castilla & Leon, C Lopez Bravo 70, Burgos 09001, Spain
[2] Univ Cluj Napoca, Dept Comp Sci, Baritiu 26-28, Cluj Napoca 400027, Romania
[3] Univ Burgos, Dept Civil Engn, Ave Cantabria S-N, Burgos 09006, Spain
[4] Univ Salamanca, Dept Comp Sci & Automat, Plaza Merced S-N, Salamanca 37008, Spain
[5] Univ Oviedo, Dept Comp Sci, ETSIMO, Oviedo 33005, Spain
关键词
Feature selection; evolutionary computation; max-relevance min-redundancy criteria; information correlation; coefficient; Android; malware; FEATURE-SELECTION;
D O I
10.1093/jigpal/jzw046
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In recent years, mobile devices such as smartphones, tablets and wearables have become the new paradigm of user-computer interaction. The increasing use and adoption of such devices is also leading to an increased number of potential security risks. The spread of mobile malware, particularly on popular and open platforms such as Android, has become a major concern. This paper focuses on the bad-intentioned Android apps by addressing the problem of selecting the key features of such software that support the characterization of such malware. The accurate detection and characterization of this software is still an open challenge, mainly due to its ever-changing nature and the open distribution channels of Android apps. Maximum relevance minimum redundancy and evolutionary algorithms guided by information correlation measures have been applied for feature selection on the well-known Android Malware Genome (Malgenome) dataset, attaining interesting results on the most informative features for the characterization of representative families of existing Android malware.
引用
收藏
页码:54 / 66
页数:13
相关论文
共 23 条
[1]   A Novel Approach to Detect Android Malware [J].
Almin, Shaikh Bushra ;
Chatterjee, Madhumita .
INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA), 2015, 45 :407-417
[2]  
Arshad S, 2016, INT J ADV COMPUT SC, V7, P463
[3]   A Probabilistic Discriminative Model for Android Malware Detection with Decompiled Source Code [J].
Cen, Lei ;
Gates, Christoher S. ;
Si, Luo ;
Li, Ninghui .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (04) :400-412
[4]  
Cover TM., 1991, ELEMENTS INFORM THEO, V1, P279
[5]  
Ding Chris, 2005, Journal of Bioinformatics and Computational Biology, V3, P185, DOI 10.1142/S0219720005001004
[6]   A review on feature selection in mobile malware detection [J].
Feizollah, Ali ;
Anuar, Nor Badrul ;
Salleh, Rosli ;
Wahab, Ainuddin Wahid Abdul .
DIGITAL INVESTIGATION, 2015, 13 :22-37
[7]   Smart malware detection on Android [J].
Gheorghe, Laura ;
Marin, Bogdan ;
Gibson, Gary ;
Mogosanu, Lucian ;
Deaconescu, Razvan ;
Voiculescu, Valentin-Gabriel ;
Carabas, Mihai .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) :4254-4272
[8]  
Guyon I, 2003, J MACH LEARN RES, V3, P1157, DOI DOI 10.1162/153244303322753616
[9]   Diverse accurate feature selection for microarray cancer diagnosis [J].
Hatami, Nima ;
Chira, Camelia .
INTELLIGENT DATA ANALYSIS, 2013, 17 (04) :697-716
[10]   Detecting and classifying method based on similarity matching of Android malware behavior with profile [J].
Jang, Jae-Wook ;
Yun, Jaesung ;
Mohaisen, Aziz ;
Woo, Jiyoung ;
Kim, Huy Kang .
SPRINGERPLUS, 2016, 5