DecaDroid Classification and Characterization of Malicious Behaviour in Android Applications

被引:1
|
作者
Gupta, Charu [1 ]
Singh, Rakesh Kumar [2 ]
Bhatia, Simran Kaur [1 ]
Mohapatra, Amar Kumar [1 ]
机构
[1] Indira Gandhi Delhi Tech Univ Women, Delhi, India
[2] Indira Gandhi Delhi Tech Univ Women, Dept Informat Technol, Delhi, India
关键词
Android Malware; Data Flow Analysis; Data Leakage; Gradient Boosting Tree; Malware Families; Smartphones; Source-Sink Pair; Static Analysis; MALWARE DETECTION;
D O I
10.4018/IJISP.2020100104
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Widespread use of Android-based applications on the smartphones has resulted in significant growth of security attack incidents. Malware-based attacks are the most common attacks on Android-based smartphones. To forestall malware from attacking the users, a much better understanding of Android malware and its behaviour is required. In this article, an approach to classify and characterise the malicious behaviour of Android applications using static features, data flow analysis, and machine learning techniques has been proposed. Static features like hardware components, permissions, Android components and inter-component communication along with unique source-sink pairs obtained from data flow analysis have been used to extract the features of the Android applications. Based on the features extracted, the malicious behaviour of the applications has been classified to their respective malware family. The proposed approach has given 95.19% accuracy rate and F1 measure of 92.19302 with the largest number of malware families classified as compared to previous work.
引用
收藏
页码:57 / 73
页数:17
相关论文
共 50 条
  • [1] ApkClassiFy: Identification and Classification of packed Android Malicious Applications
    Guo, Xu
    Zheng, Tao
    Chen, Xingshu
    Wang, Qixu
    Shao, Jiang
    Hu, Zhijie
    [J]. 2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 2092 - 2097
  • [2] CSForest: an approach for imbalanced family classification of android malicious applications
    Dhalaria M.
    Gandotra E.
    [J]. International Journal of Information Technology, 2021, 13 (3) : 1059 - 1071
  • [3] Detection of Malicious Applications on Android OS
    Di Cerbo, Francesco
    Girardello, Andrea
    Michahelles, Florian
    Voronkova, Svetlana
    [J]. COMPUTATIONAL FORENSICS, 2011, 6540 : 138 - +
  • [4] A Novel Method to Avoid Malicious Applications on Android
    Lee, Sangho
    Ju, Da Young
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05): : 121 - 130
  • [5] Automated identification of installed malicious Android applications
    Guido, Mark
    Ondricek, Jared
    Grover, Justin
    Wilburn, David
    Thanh Nguyen
    Hunt, Andrew
    [J]. DIGITAL INVESTIGATION, 2013, 10 : S96 - S104
  • [6] Malicious Application Detection and Classification System for Android Mobiles
    Malik, Sapna
    Khatter, Kiran
    [J]. INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE, 2018, 9 (01) : 95 - 114
  • [7] DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications
    Yang, Chao
    Xu, Zhaoyan
    Gu, Guofei
    Yegneswaran, Vinod
    Porras, Phillip
    [J]. COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 163 - 182
  • [8] Visualizing Android Malicious Applications Using Texture Features
    Sharma, Tejpal
    Rattan, Dhavleesh
    [J]. INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2023, 23 (06)
  • [9] On the Efficacy of Static Features to Detect Malicious Applications in Android
    Geneiatakis, Dimitris
    Satta, Riccardo
    Fovino, Igor Nai
    Neisse, Ricardo
    [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2015, 9264 : 87 - 98
  • [10] Detecting Malicious Android Applications from Runtime Behavior
    Lageman, Nathaniel
    Lindsey, Mark
    Glodek, William
    [J]. 2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 324 - 329