Fingerprinting Android malware families

被引:0
作者
Nannan Xie
Xing Wang
Wei Wang
Jiqiang Liu
机构
[1] Beijing Jiaotong University,Beijing Key Laboratory of Security and Privacy in Intelligent Transportation
[2] Changchun University of Science and Technology,School of Computer Science and Technology
来源
Frontiers of Computer Science | 2019年 / 13卷
关键词
Android malware; malware family; feature selection; behavior analysis;
D O I
暂无
中图分类号
学科分类号
摘要
The domination of the Android operating system in the market share of smart terminals has engendered increasing threats of malicious applications (apps). Research on Android malware detection has received considerable attention in academia and the industry. In particular, studies on malware families have been beneficial to malware detection and behavior analysis. However, identifying the characteristics of malware families and the features that can describe a particular family have been less frequently discussed in existing work. In this paper, we are motivated to explore the key features that can classify and describe the behaviors of Android malware families to enable fingerprinting the malware families with these features. We present a framework for signature-based key feature construction. In addition, we propose a frequency-based feature elimination algorithm to select the key features. Finally, we construct the fingerprints of ten malware families, including twenty key features in three categories. Results of extensive experiments using Support Vector Machine demonstrate that the malware family classification achieves an accuracy of 92% to 99%. The typical behaviors of malware families are analyzed based on the selected key features. The results demonstrate the feasibility and effectiveness of the presented algorithm and fingerprinting method.
引用
收藏
页码:637 / 646
页数:9
相关论文
共 50 条
[41]   An Exploratory Analysis in Android Malware Trends [J].
Hicks, Chelsea ;
Dietrich, Glenn .
AMCIS 2016 PROCEEDINGS, 2016,
[42]   Dissecting Android Malware: Characterization and Evolution [J].
Zhou, Yajin ;
Jiang, Xuxian .
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, :95-109
[43]   Detecting Malware with Similarity to Android applications [J].
Park, Wonjoo ;
Kim, Sun-joong ;
Ryu, Won .
2015 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC), 2015, :1249-1251
[44]   Permission Weighting Approaches in Permission Based Android Malware Detection [J].
Kural, Oguz Emre ;
Sahin, Durmus Ozkan ;
Akleylek, Sedat ;
Kilic, Erdal .
2019 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2019, :134-139
[45]   Why an Android App Is Classified as Malware: Toward Malware Classification Interpretation [J].
Wu, Bozhi ;
Chen, Sen ;
Gao, Cuiyun ;
Fan, Lingling ;
Liu, Yang ;
Wen, Weiping ;
Lyu, Michael R. .
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021, 30 (02)
[46]   Malware Family Fingerprinting Through Behavioral Analysis [J].
Walker, Aaron ;
Sengupta, Shamik .
2020 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2020, :42-46
[47]   Deep Android Malware Classification with API-based Feature Graph [J].
Huang, Na ;
Xu, Ming ;
Zheng, Ning ;
Qiao, Tong ;
Choo, Kim-Kwang Raymond .
2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, :296-303
[48]   An Attention-Based Approach to Enhance the Detection and Classification of Android Malware [J].
Ghourabi, Abdallah .
CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (02) :2743-2760
[49]   VolMemDroid-Investigating android malware insights with volatile memory artifacts [J].
Khalid, Saneeha ;
Hussain, Faisal Bashir .
EXPERT SYSTEMS WITH APPLICATIONS, 2024, 253
[50]   Towards a Network-Based Framework for Android Malware Detection and Characterization [J].
Lashkari, Arash Habibi ;
Kadir, Andi Fitriah A. ;
Gonzalez, Hugo ;
Mbah, Kenneth Fon ;
Ghorbani, Ali A. .
2017 15TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2017, :233-242