On machine learning effectiveness for malware detection in Android OS using static analysis data

被引:29
作者
Syrris, Vasileios [1 ]
Geneiatakis, Dimitris [1 ]
机构
[1] European Commiss, Joint Res Ctr JRC, Via E Fermi 2749, I-21027 Ispra, Va, Italy
关键词
Machine learning; Supervised learning; Classification; Feature importance; Malware detection; Goodware; Android operating system; Security; PERMISSION-INDUCED RISK; REGRESSION; SELECTION; ENSEMBLE; APPS;
D O I
10.1016/j.jisa.2021.102794
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although various security mechanisms have been introduced in Android operating system in order to enhance its robustness, sheer protection remains an open issue: malicious applications (named as malware) usually find ways to bypass the security processes, whereas users are not aware a priori whether an application can operate as malware. To eliminate this problem, several approaches leverage machine learning for detecting malware using static analysis data. In this direction, we study the effectiveness of supervised machine learning algorithms using static analysis data extracted from the Drebin data set and we provide a short survey of other related works in the domain. We evaluate six well-known classification techniques under different configurations in terms of i) capacity of detecting Android malware and ii) feature selection. Our experimental results demonstrate that classification can reach a high level of accuracy by using only a small subset of features.
引用
收藏
页数:22
相关论文
共 48 条
[1]  
Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
[2]  
Aggarwal CC, DATABASE THEORY ICDT
[3]  
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1109/MSR.2016.056, 10.1145/2901739.2903508]
[4]  
[Anonymous], 2006, ACM SIGOPS OPER SYST, DOI DOI 10.1145/1218063.1217938
[5]  
[Anonymous], 2012, P 27 ANN ACM S APPL, DOI DOI 10.1145/2245276.2232070
[6]  
[Anonymous], 2012, P 5 ACM C SEC PRIV W
[7]  
[Anonymous], 2019, 16 INT C MIN SOFTW R
[8]  
[Anonymous], 2014, DREBIN EFFECTIVE EXP
[9]   Privacy Threats through Ultrasonic Side Channels on Mobile Devices [J].
Arp, Daniel ;
Quiring, Erwin ;
Wressnegger, Christian ;
Rieck, Konrad .
2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, :35-47
[10]  
Bishop C.M., 1995, Neural networks for pattern recognition