DroidEnsemble: Detecting Android Malicious Applications With Ensemble of String and Structural Static Features

被引:67
作者
Wang, Wei [1 ,2 ]
Gao, Zhenzhen [1 ]
Zhao, Meichen [1 ]
Li, Yidong [1 ]
Liu, Jiqiang [1 ]
Zhang, Xiangliang [3 ]
机构
[1] Beijing Jiaotong Univ, Beijing Key Lab Secur & Privacy Intelligent Trans, Beijing 100044, Peoples R China
[2] Sci & Technol Elect Informat Control Lab, Chengdu 610036, Sichuan, Peoples R China
[3] King Abdullah Univ Sci & Technol, Div Comp Elect & Math Sci & Engn, Thuwal 239556900, Saudi Arabia
来源
IEEE ACCESS | 2018年 / 6卷
关键词
Android malicious application analysis; malware analysis; software failure reduction; static analysis; SYSTEM; APPS;
D O I
10.1109/ACCESS.2018.2835654
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Android platform has dominated the operating system of mobile devices. However, the dramatic increase of Android malicious applications (malapps) has caused serious software failures to Android system and posed a great threat to users. The effective detection of Android malapps has thus become an emerging yet crucial issue. Characterizing the behaviors of Android applications (apps) is essential to detecting malapps. Most existing works on detecting Android malapps were mainly based on string static features, such as permissions and API usage extracted from apps. There also exists work on the detection of Android malapps with structural features, such as control flow graph and data flow graph. As Android malapps have become increasingly polymorphic and sophisticated, using only one type of static features may result in false negatives. In this paper, we propose DroidEnsemble that takes advantages of both string features and structural features to systematically and comprehensively characterize the static behaviors of Android apps and thus build a more accurate detection model for the detection of Android malapps. We extract each app's string features, including permissions, hardware features, filter intents, restricted API calls, used permissions, code patterns, as well as structural features like function call graph. We then use three machine learning algorithms, namely, support vector machine, k-nearest neighbor, and random forest, to evaluate the performance of these two types of features and of their ensemble. In the experiments, we evaluate our methods and models with 1386 benign apps and 1296 malapps. Extensive experimental results demonstrate the effectiveness of DroidEnsemble. It achieves the detection accuracy as 95.8% with only string features and as 90.68% with only structural features. DroidEnsemble reaches the detection accuracy as 98.4% with the ensemble of both types of features, reducing 9 false positives and 12 false negatives compared to the results with only string features.
引用
收藏
页码:31798 / 31807
页数:10
相关论文
共 39 条
  • [1] DroidNative: Automating and optimizing detection of Android native code malware variants
    Alam, Shahid
    Qu, Zhengyang
    Riley, Ryan
    Chen, Yan
    Rastogi, Vaibhav
    [J]. COMPUTERS & SECURITY, 2017, 65 : 230 - 246
  • [2] [Anonymous], P WISEC
  • [3] [Anonymous], 2016, P 17 ANN C INF TECHN
  • [4] Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
    Arp, Daniel
    Spreitzenbarth, Michael
    Huebner, Malte
    Gascon, Hugo
    Rieck, Konrad
    [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [5] Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2594291.2594299, 10.1145/2666356.2594299]
  • [6] Au K. W. Y., 2012, Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12, ACM, New York, NY, USA, P217, DOI 10.1145/2382196.2382222
  • [7] Achieving Accuracy and Scalability Simultaneously in Detecting Application Clones on Android Markets
    Chen, Kai
    Liu, Peng
    Zhang, Yingjun
    [J]. 36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2014), 2014, : 175 - 186
  • [8] Chen X., 2015, P 8 ACM C SEC PRIV W, DOI [10.1145/2766498.2766507, DOI 10.1145/2766498.2766507]
  • [9] Crussell Jonathan, 2012, Computer Security - ESORICS 2012. Proceedings 17th European Symposium on Research in Computer Security, P37, DOI 10.1007/978-3-642-33167-1_3
  • [10] Desnos Anthony., 2013, Androguard-reverse engineering, malware and goodware analysis of android applications