END-TO-END ANDROID MALWARE CLASSIFICATION BASED ON PURE TRAFFIC IMAGES

被引:7
作者
Peng Yujie [1 ]
Niu Weina [1 ]
Zhang Xiaosong [1 ]
Zhou Jie [1 ]
Wu Hao [1 ]
Chen Ruidong [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
来源
2020 17TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP) | 2020年
基金
中国国家自然科学基金;
关键词
Android malware classification; Deep learning; Network traffic; End-to-end;
D O I
10.1109/ICCWAMTIP51612.2020.9317489
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Android security accidents frequently occurred in recent years. It has become an urgent need to propose a method for efficiently detecting and classifying Android malware. Many existing machine learning-based methods often require a lot of time for feature engineering, making it time-consuming to classify malware. To accurately and rapidly detect and classify Android malware, this paper proposes an end-to-end Android malware classification model based on traffic analysis and deep learning. The model uses traffic data generated during the Android APP's runtime as input. First, the traffic data will be processed by a third-party traffic removal module based on the idea of clustering to remove impurity traffic that is not conducive to the classification. Then the pure traffic is converted into pure traffic images which can represent traffic characteristics. Finally, a novel convolutional neural network model named 1.5D-CNN is applied to detect and classify malware by classifying these images. The model was trained and tested on a real Android traffic dataset named CICAndMal2017 which contains the traffic data of benign APPs and four types of malware, and it achieved an average accuracy of 98.5%. Compared with traditional machine learning methods, precision and recall both increased by more than 20 percentage points on average.
引用
收藏
页码:240 / 245
页数:6
相关论文
共 13 条
  • [11] Wang S, 2019, 2018 IEEE ACM 26 INT
  • [12] Wang W, 2017, 2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), P43, DOI 10.1109/ISI.2017.8004872
  • [13] Wang W, 2017, 2017 31ST INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), P712, DOI 10.1109/ICOIN.2017.7899588