MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention

被引:233
|
作者
Saracino, Andrea [1 ]
Sgandurra, Daniele [2 ]
Dini, Gianluca [3 ]
Martinelli, Fabio [1 ]
机构
[1] CNR, Inst Informat & Telemat, Pisa, Italy
[2] Imperial Coll London, Dept Comp, London SW7 2AZ, England
[3] Univ Pisa, Dept Ingn Informaz, I-56100 Pisa, Italy
关键词
Android security; intrusion detection system; malware; classification; SECURITY;
D O I
10.1109/TDSC.2016.2536605
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Android users are constantly threatened by an increasing number of malicious applications (apps), generically called malware. Malware constitutes a serious threat to user privacy, money, device and file integrity. In this paper we note that, by studying their actions, we can classify malware into a small number of behavioral classes, each of which performs a limited set of misbehaviors that characterize them. These misbehaviors can be defined by monitoring features belonging to different Android levels. In this paper we present MADAM, a novel host-based malware detection system for Android devices which simultaneously analyzes and correlates features at four levels: kernel, application, user and package, to detect and stop malicious behaviors. MADAM has been specifically designed to take into account those behaviors that are characteristics of almost every real malware which can be found in the wild. MADAM detects and effectively blocks more than 96 percent of malicious apps, which come from three large datasets with about 2,800 apps, by exploiting the cooperation of two parallel classifiers and a behavioral signature-based detector. Extensive experiments, which also includes the analysis of a testbed of 9,804 genuine apps, have been conducted to show the low false alarm rate, the negligible performance overhead and limited battery consumption.
引用
收藏
页码:83 / 97
页数:15
相关论文
共 50 条
  • [1] An effective behavior-based Android malware detection system
    Zou, Shihong
    Zhang, Jing
    Lin, Xiaodong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (12) : 2079 - 2089
  • [2] On Behavior-based Detection of Malware on Android Platform
    Yu, Wei
    Zhang, Hanlin
    Ge, Linqiang
    Hardy, Rommie
    [J]. 2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 814 - 819
  • [3] Shikra: A behavior-based Android malware detection framework
    Ma Zhao-hui
    Chen Zi-hao
    Wang Xin-ming
    Nic Rui-hua
    Zhao Gan-sen
    Wu Jie-chao
    Ren Xue-qi
    [J]. 2017 INTERNATIONAL CONFERENCE ON GREEN INFORMATICS (ICGI), 2017, : 175 - 184
  • [4] A Design of Network Behavior-Based Malware Detection System for Android
    Qi, Yincheng
    Cao, Mingjing
    Zhang, Can
    Wu, Ruping
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2014, PT II, 2014, 8631 : 590 - 600
  • [5] An Android Behavior-Based Malware Detection Method using Machine Learning
    Chang, Wei-Ling
    Sun, Hung-Min
    Wu, Wei
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC), 2016,
  • [6] Lightweight Behavior-Based Malware Detection
    Anisetti, Marco
    Ardagna, Claudio A.
    Bena, Nicola
    Giandomenico, Vincenzo
    Gianini, Gabriele
    [J]. MANAGEMENT OF DIGITAL ECOSYSTEMS, MEDES 2023, 2024, 2022 : 237 - 250
  • [7] Behavior-based malware analysis and detection
    Liu, Wu
    Ren, Ping
    Liu, Ke
    Duan, Hai-Xin
    [J]. Proceedings - 2011 1st International Workshop on Complexity and Data Mining, IWCDM 2011, 2011, : 39 - 42
  • [8] A BEHAVIOR-BASED APPROACH FOR MALWARE DETECTION
    Mosli, Rayan
    Li, Rui
    Yuan, Bo
    Pan, Yin
    [J]. ADVANCES IN DIGITAL FORENSICS XIII, 2017, 511 : 187 - 201
  • [9] Monet: A User-Oriented Behavior-Based Malware Variants Detection System for Android
    Sun, Mingshen
    Li, Xiaolei
    Lui, John C. S.
    Ma, Richard T. B.
    Liang, Zhenkai
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (05) : 1103 - 1112
  • [10] Behavior-based features model for malware detection
    Galal H.S.
    Mahdy Y.B.
    Atiea M.A.
    [J]. Journal of Computer Virology and Hacking Techniques, 2016, 12 (2) : 59 - 67