An Android Malicious Application Detection Method with Decision Mechanism in the Operating Environment of Blockchain

被引:1
作者
Li, Xingyu [1 ]
Zhao, Zongqu [1 ]
Tang, Yongli [1 ]
Zhang, Jing [1 ]
Wu, Chengyi [1 ]
Li, Ying [1 ]
机构
[1] Henan Polytech Univ, Sch Comp Sci & Technol, Jiaozuo 454000, Henan, Peoples R China
关键词
D O I
10.1155/2022/3111540
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, security policies and behaviour detection methods have been proposed to improve the security of blockchain by many researchers. However, these methods cannot discover the source of typical behaviours, such as the malicious applications in the blockchain environment. Android application is an important part of the blockchain operating environment, and machine learning-based Android malware application detection method is significant for blockchain user security. The way of constructing features in these methods determines the performance. The single-feature mechanism, training classifiers with one type of features, cannot detect the malicious applications effectively which exhibit the typical behaviours in various forms. The multifeatures fusion mechanism, constructing mixed features from multiple types of data sources, can cover more kinds of information. However, different types of data sources will interfere with each other in the mixed features constructed by this mechanism. That limits the performance of the model. In order to improve the detection performance of Android malicious applications in complex scenarios, we propose an Android malicious application detection method which includes parallel feature processing and decision mechanism. Our method uses RGB image visualization technology to construct three types of RGB image which are utilized to train different classifiers, respectively, and a decision mechanism is designed to fuse the outputs of subclassifiers through weight analysis. This approach simultaneously extracts different types of features, which preserve application information comprehensively. Different classifiers are trained by these features to guarantee independence of each feature and classifier. On this basis, a comprehensive analysis of many methods is performed on the Android malware dataset, and the results show that our method has better efficiency and adaptability than others.
引用
收藏
页数:10
相关论文
共 30 条
[1]   Identifying Android malware using dynamically obtained features [J].
Afonso, Vitor Monte ;
de Amorim, Matheus Favero ;
Abed Gregio, Andre Ricardo ;
Junquera, Glauco Barroso ;
de Geus, Paulo Licio .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2015, 11 (01) :9-17
[2]   A Novel Approach to Detect Android Malware [J].
Almin, Shaikh Bushra ;
Chatterjee, Madhumita .
INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA), 2015, 45 :407-417
[3]   SysDroid: a dynamic ML-based android malware analyzer using system call traces [J].
Ananya, A. ;
Aswathy, A. ;
Amal, T. R. ;
Swathy, P. G. ;
Vinod, P. ;
Shojafar, Mohammad .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (04) :2789-2808
[4]  
[Anonymous], 2011, P 8 INT S VIS CYB SE, DOI 10.1145/2016904.2016908
[5]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[6]   SAMADroid: A Novel 3-Level Hybrid Malware Detection Model for Android Operating System [J].
Arshad, Saba ;
Shah, Munam A. ;
Wahid, Abdul ;
Mehmood, Amjad ;
Song, Houbing ;
Yu, Hongnian .
IEEE ACCESS, 2018, 6 :4321-4339
[7]   Effectiveness of Opcode ngrams for Detection of Multi Family Android Malware [J].
Canfora, Gerardo ;
De Lorenzo, Andrea ;
Medvet, Eric ;
Mercaldo, Francesco ;
Visaggio, Corrado Aaron .
PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, :333-340
[8]   An Adversarial Machine Learning Model Against Android Malware Evasion Attacks [J].
Chen, Lingwei ;
Hou, Shifu ;
Ye, Yanfang ;
Chen, Lifei .
WEB AND BIG DATA, 2017, 10612 :43-55
[9]   Dynamic Multi-Key FHE in Asymmetric Key Setting From LWE [J].
Chen, Yuling ;
Dong, Sen ;
Li, Tao ;
Wang, Yilei ;
Zhou, Huiyu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 :5239-5249
[10]   PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs [J].
Chen, Yuling ;
Sun, Jing ;
Yang, Yixian ;
Li, Tao ;
Niu, Xinxin ;
Zhou, Huiyu .
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (02) :1204-1221