DecaDroid Classification and Characterization of Malicious Behaviour in Android Applications

被引:1
|
作者
Gupta, Charu [1 ]
Singh, Rakesh Kumar [2 ]
Bhatia, Simran Kaur [1 ]
Mohapatra, Amar Kumar [1 ]
机构
[1] Indira Gandhi Delhi Tech Univ Women, Delhi, India
[2] Indira Gandhi Delhi Tech Univ Women, Dept Informat Technol, Delhi, India
关键词
Android Malware; Data Flow Analysis; Data Leakage; Gradient Boosting Tree; Malware Families; Smartphones; Source-Sink Pair; Static Analysis; MALWARE DETECTION;
D O I
10.4018/IJISP.2020100104
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Widespread use of Android-based applications on the smartphones has resulted in significant growth of security attack incidents. Malware-based attacks are the most common attacks on Android-based smartphones. To forestall malware from attacking the users, a much better understanding of Android malware and its behaviour is required. In this article, an approach to classify and characterise the malicious behaviour of Android applications using static features, data flow analysis, and machine learning techniques has been proposed. Static features like hardware components, permissions, Android components and inter-component communication along with unique source-sink pairs obtained from data flow analysis have been used to extract the features of the Android applications. Based on the features extracted, the malicious behaviour of the applications has been classified to their respective malware family. The proposed approach has given 95.19% accuracy rate and F1 measure of 92.19302 with the largest number of malware families classified as compared to previous work.
引用
收藏
页码:57 / 73
页数:17
相关论文
共 50 条
  • [21] A detection model of malicious Android applications based on Naive Bayes
    Wang, Chundong
    Zhao, Yi
    Mo, Xiuliang
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2019, 11 (04) : 508 - 515
  • [22] Mining permission patterns for contrasting clean and malicious android applications
    Moonsamy, Veelasha
    Rong, Jia
    Liu, Shaowu
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 36 : 122 - 132
  • [23] Detecting malicious Android applications based on the network packets generated
    de la Puerta, Jose Gaviria
    Pastor-Lopez, Iker
    Porto, Igone
    Sanz, Borja
    Garcia Bringas, Pablo
    NEUROCOMPUTING, 2021, 456 : 629 - 636
  • [24] Reversing and auditing of android malicious applications using sandboxing environment
    Raymond, V. Joseph
    Raj, R. Jeberson Retna
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2020, 12 (04) : 386 - 396
  • [25] AppFA: A Novel Approach to Detect Malicious Android Applications on the Network
    He, Gaofeng
    Xu, Bingfeng
    Zhu, Haiting
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [26] Characterization and classification of malicious Web traffic
    Goseva-Popstojanova, Katerina
    Anastasovski, Goce
    Dimitrijevikj, Ana
    Pantev, Risto
    Miller, Brandon
    COMPUTERS & SECURITY, 2014, 42 : 92 - 115
  • [27] INFRASTRUCTURE FOR LEARNING THE BEHAVIOUR OF MALICIOUS AND ABNORMAL APPLICATIONS
    Gheorghe, Laura
    Mogosanu, Lucian
    Carabas, Mihai
    Voiculescu, Valentin-Gabriel
    Gibson, Gary
    RETHINKING EDUCATION BY LEVERAGING THE ELEARNING PILLAR OF THE DIGITAL AGENDA FOR EUROPE!, VOL. I, 2015, : 202 - 209
  • [28] MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral Classes
    La Marra, Antonio
    Martinelli, Fabio
    Saracino, Andrea
    Sheikhalishahi, Mina
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2016, 2017, 10128 : 3 - 19
  • [29] Android Malicious Application Family Classification Model Incorporating MAML and CBAM
    Su, Qing
    Lin, Jiarui
    Huang, Haibin
    Huang, Jianfeng
    Computer Engineering and Applications, 2024, 59 (02) : 271 - 279
  • [30] Web-Based Android Malicious Software Detection and Classification System
    Dogru, Ibrahim Alper
    Kiraz, Omer
    APPLIED SCIENCES-BASEL, 2018, 8 (09):