Anomadroid: profiling Android applications' behaviors for identifying unknown malapps

被引:0
作者
Su, Dan [1 ]
Wang, Wei [1 ]
Wang, Xing [1 ]
Liu, Jiqiang [1 ]
机构
[1] Beijing Jiaotong Univ, Sch Comp & Informat Technol, Beijing, Peoples R China
来源
2016 IEEE TRUSTCOM/BIGDATASE/ISPA | 2016年
关键词
Android security; anomaly detection; malware detection;
D O I
10.1109/TrustCom.2016.126
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Android has dominated the market of mobile devices. Meanwhile, it has become the main target for attackers. How to detect and analyze Android malicious applications (malapps) is an ongoing challenge. Current malapps have become increasingly sophisticated. In particular, zero-day (unknown) malapps appear very frequently and can evade most detection systems that are based on the signatures or patterns of existing malapps. In this work, we propose a system called Anomadroid (anomaly Android malapp detection system) that profiles the normal behaviors of Android apps based on only benign samples. Any app whose behaviors unacceptably deviate from the normal profile is identified as malicious. We firstly extract 4209 features that are divided into 9 categories such as permissions and APIs, from each app for the profiling. We then use term frequency-inverse document frequency (tf-idf) and employ k-Nearest Neighbor (k-NN) and Principal Component Analysis (PCA) for anomaly detection. We evaluate Anomadroid on a large app set consisting of 15,000 benign apps as well as 1500 malapps. The experimental results show that our system is better than existing methods and achieves a detection rate as 94.08% with false positive rate as 16.15%.
引用
收藏
页码:691 / 698
页数:8
相关论文
共 21 条
  • [1] [Anonymous], 2014, NDSS
  • [2] [Anonymous], 2016, INTERNET SECURITY RE
  • [3] [Anonymous], 2011, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
  • [4] [Anonymous], 2012, Proceedings of ACM Symposium on Access Control Models and Technologies
  • [5] Au K. W. Y., 2012, Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12, ACM, New York, NY, USA, P217, DOI 10.1145/2382196.2382222
  • [6] Mining Apps for Abnormal Usage of Sensitive Data
    Avdiienko, Vitalii
    Kuznetsov, Konstantin
    Gorla, Alessandra
    Zeller, Andreas
    Arzt, Steven
    Rasthofer, Siegfried
    Bodden, Eric
    [J]. 2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1, 2015, : 426 - 436
  • [7] Blasing Thomas, 2010, 2010 5th International Conference on Malicious and Unwanted Software (MALWARE 2010), P55, DOI 10.1109/MALWARE.2010.5665792
  • [8] TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
    Enck, William
    Gilbert, Peter
    Han, Seungyeop
    Tendulkar, Vasant
    Chun, Byung-Gon
    Cox, Landon P.
    Jung, Jaeyeon
    McDaniel, Patrick
    Sheth, Anmol N.
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2014, 32 (02):
  • [9] Felt Adrienne Porter, 2011, CCS 11
  • [10] Apposcopy: Semantics-Based Detection of Android Malware through Static Analysis
    Feng, Yu
    Anand, Saswat
    Dillig, Isil
    Aiken, Alex
    [J]. 22ND ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (FSE 2014), 2014, : 576 - 587