Android Malware Detection Using Hybrid Analysis and Machine Learning Technique

被引:8
作者
Yang, Fan [1 ]
Zhuang, Yi [1 ]
Wang, Jun [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
来源
CLOUD COMPUTING AND SECURITY, PT II | 2017年 / 10603卷
基金
中国国家自然科学基金;
关键词
Android; Malware detection; Dynamic analysis; Static analysis; Machine learning;
D O I
10.1007/978-3-319-68542-7_48
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a two-stage Android malware detection and classification mechanism based on machine learning algorithm. In this paper, we use the static analysis method to extract the software's package features, permission features, component features and triggering mechanism. Then we use the dynamic analysis tools to obtain the dynamic behavior characters of the software, and format the static and dynamic features. Finally, we use the machine learning algorithm to deal with the feature eigenvectors in two stages, and then we will get the malicious classification of the software. The experimental results show that in the data set used in this paper the proposed method based on the combination of dynamic and static malicious code detection is more accurate than the common detection engine, and the ability of classifying malicious family is much stronger.
引用
收藏
页码:565 / 575
页数:11
相关论文
共 15 条
[11]   "Andromaly": a behavioral malware detection framework for android devices [J].
Shabtai, Asaf ;
Kanonov, Uri ;
Elovici, Yuval ;
Glezer, Chanan ;
Weiss, Yael .
JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2012, 38 (01) :161-190
[12]   Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques [J].
Spreitzenbarth, Michael ;
Schreck, Thomas ;
Echtler, Florian ;
Arp, Daniel ;
Hoffmann, Johannes .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (02) :141-153
[13]  
Yang C, 2014, LECT NOTES COMPUT SC, V8712, P163, DOI 10.1007/978-3-319-11203-9_10
[14]   Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs [J].
Zhang, Mu ;
Duan, Yue ;
Yin, Heng ;
Zhao, Zhiruo .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :1105-1116
[15]   Dissecting Android Malware: Characterization and Evolution [J].
Zhou, Yajin ;
Jiang, Xuxian .
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, :95-109