A New Compression Based Method for Android Malware Detection Using Opcodes

被引:0
作者
Bakhshinejad, Nazanin [1 ]
Hamzeh, Ali [1 ]
机构
[1] Shiraz Univ, Dept Comp Sci & Engn & IT, Shiraz, Iran
来源
2017 19TH CSI INTERNATIONAL SYMPOSIUM ON ARTIFICIAL INTELLIGENCE AND SIGNAL PROCESSING (AISP) | 2017年
关键词
Classification; data compression; malware detection; mobile security; machine learning; Opcode;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
nowadays, the functionality of mobile devices improved substantially which in some cases they were as capable as personal computers. We perform a wide range of our daily tasks with mobile devices like browsing the internet, checking mail, social networking and transforming money. As these smart devices become more popular and usable, they attracted more attackers. Recently, mobile malwares increased sharply and their caused detriments menace the usability and privacy due to the sensitive data which are stored in these devices. According to the intense increase in the number of these attacks yearly, malware detection becomes a prominent topic in mobile security. Since traditional signature based techniques which are used by commercial antivirus have failed to detect new and obfuscated malwares, machine learning approaches have been employed to find and detect behavior patterns of malwares from extracted features. In this paper, a new heuristic malware detection technique was proposed based on compression methods. The momentous superiority of this approach is using opcode as an input for compression models which causes accuracy to be increased. To assess the potency of the proposed methods, several experiments are conducted. The experimental results of method show promising improvement of accuracy to support the main idea.
引用
收藏
页码:256 / 261
页数:6
相关论文
共 19 条
  • [1] Afonso V., 2014, J COMPUTER VIROLOGY
  • [2] [Anonymous], 2014, 21 ANN NETW DISTR SY
  • [3] Bazrafshan Z, 2013, 2013 5TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT), P113, DOI 10.1109/IKT.2013.6620049
  • [4] Bratko A, 2006, J MACH LEARN RES, V7, P2673
  • [5] Canfora G., 2015, P 3 INT WORKSH SOFTW
  • [6] DATA-COMPRESSION USING ADAPTIVE CODING AND PARTIAL STRING MATCHING
    CLEARY, JG
    WITTEN, IH
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 1984, 32 (04) : 396 - 402
  • [7] Cormack Gordon, 2008, NATO SECURITY SCI SE, V15, P142
  • [8] Using Dalvik Opcodes for Malware Detection on Android
    Gaviria de la Puerta, Jose
    Sanz, Borja
    Santos, Igor
    Garcia Bringas, Pablo
    [J]. HYBRID ARTIFICIAL INTELLIGENT SYSTEMS (HAIS 2015), 2015, 9121 : 416 - 426
  • [9] Jerome Q., 2014, 2014 IEEE INT C COMM
  • [10] Kang B, 2016, 2016 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY)