Android malware detection based on system call sequences and LSTM

被引:0
|
作者
Xi Xiao
Shaofeng Zhang
Francesco Mercaldo
Guangwu Hu
Arun Kumar Sangaiah
机构
[1] Tsinghua University,Graduate School At Shenzhen
[2] Institute for Informatics and Telematics,School of Computer Science
[3] National Research Council of Italy,School of Computing Science and Engineering
[4] Shenzhen Institute of Information Technology,undefined
[5] VIT University,undefined
来源
Multimedia Tools and Applications | 2019年 / 78卷
关键词
Android malware detection; System call sequences; Deep learning; LSTM language model;
D O I
暂无
中图分类号
学科分类号
摘要
As Android-based mobile devices become increasingly popular, malware detection on Android is very crucial nowadays. In this paper, a novel detection method based on deep learning is proposed to distinguish malware from trusted applications. Considering there is some semantic information in system call sequences as the natural language, we treat one system call sequence as a sentence in the language and construct a classifier based on the Long Short-Term Memory (LSTM) language model. In the classifier, at first two LSTM models are trained respectively by the system call sequences from malware and those from benign applications. Then according to these models, two similarity scores are computed. Finally, the classifier determines whether the application under analysis is malicious or trusted by the greater score. Thorough experiments show that our approach can achieve high efficiency and reach high recall of 96.6% with low false positive rate of 9.3%, which is better than the other methods.
引用
收藏
页码:3979 / 3999
页数:20
相关论文
共 50 条
  • [1] Android malware detection based on system call sequences and LSTM
    Xiao, Xi
    Zhang, Shaofeng
    Mercaldo, Francesco
    Hu, Guangwu
    Sangaiah, Arun Kumar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (04) : 3979 - 3999
  • [2] AN UNSUPERVISED MALWARE DETECTION SYSTEM FOR WINDOWS BASED SYSTEM CALL SEQUENCES
    Ragaventhiran, J.
    Vigneshwaran, P.
    Kodabagi, Mallikarjun M.
    Ahmed, Syed Thouheed
    Ramadoss, Prabu
    Megantoro, Prisma
    MALAYSIAN JOURNAL OF COMPUTER SCIENCE, 2022, : 79 - 92
  • [3] API Sequences based Malware Detection for Android
    Zhu, Jiawei
    Wu, Zhengang
    Guan, Zhi
    Chen, Zhong
    IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 673 - 676
  • [4] Android Gaming Malware Detection Using System Call Analysis
    Jaiswal, Mayank
    Malik, Yasir
    Jaafar, Fehmi
    2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 251 - 255
  • [5] Android Malware Detection Method Based on Function Call Graphs
    Ding, Yuxin
    Zhu, Siyi
    Xia, Xiaoling
    NEURAL INFORMATION PROCESSING, ICONIP 2016, PT IV, 2016, 9950 : 70 - 77
  • [6] Covalent Bond Based Android Malware Detection Using Permission and System Call Pairs
    Gupta, Rahul
    Sharma, Kapil
    Garg, R. K.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (03): : 4283 - 4301
  • [7] LSTM-Based Hierarchical Denoising Network for Android Malware Detection
    Yan, Jinpei
    Qi, Yong
    Rao, Qifan
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [8] Permission based detection system for android malware
    Utku, Anil
    Dogru, Ibrahim Alper
    JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY, 2017, 32 (04): : 1015 - 1024
  • [9] Permission based detection system for android malware
    Utku A.
    Doǧru I.A.
    Utku, Anil (anilutku@gazi.edu.tr), 1600, Gazi Universitesi (32): : 1015 - 1024
  • [10] SFCGDroid: android malware detection based on sensitive function call graph
    Shi, Sibo
    Tian, Shengwei
    Wang, Bo
    Zhou, Tiejun
    Chen, Guanxin
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (05) : 1115 - 1124