DroidPortrait: Android Malware Portrait Construction Based on Multidimensional Behavior Analysis

被引:12
|
作者
Su, Xin [1 ,2 ]
Xiao, Lijun [3 ]
Li, Wenjia [4 ]
Liu, Xuchong [1 ,2 ]
Li, Kuan-Ching [5 ]
Liang, Wei [6 ]
机构
[1] Hunan Police Acad, Hunan Prov Key Lab Network Invest Technol, Changsha 410000, Peoples R China
[2] Hunan Police Acad, Big Data Intelligence Police Hunan Prov Engn Res, Changsha 410000, Peoples R China
[3] Guangzhou Coll Technol & Business, Big Data Dev & Res Ctr, Guangzhou 510006, Peoples R China
[4] New York Inst Technol, Dept Comp Sci, New York, NY 10023 USA
[5] Providence Univ, Dept Comp Sci & Informat Engn, Taichung 43301, Taiwan
[6] Hunan Univ, Coll Informat Sci & Engn, Changsha 41000, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2020年 / 10卷 / 11期
关键词
Android malware; behavioral portrait; behavioral tag; machine learning; USER AUTHENTICATION SCHEME; SMART CARD;
D O I
10.3390/app10113978
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Recently, security incidents such as sensitive data leakage and video/audio hardware control caused by Android malware have raised severe security issues that threaten Android users, so thus behavior analysis and detection research researches of malicious Android applications have become a hot topic. However, the behavioral portrait of Android malware that can depict the behavior of Android malware is not approached in previous literature. To fill this gap, we propose DroidPortrait, an Android malware multi-dimensional behavioral portrait construction approach. We take the behavior of Android malware as an entry point and extract an informative behavior dataset that includes static and dynamic behavior from Android malware. Next, aiming at Android malware that contains different kinds of behaviors, a behavioral tag is defined then combined with a machine learning (ML) algorithm to implement the correlation of these behavioral tags. Android malware behavioral portrait architecture based on behavior analysis and its design is investigated, as also an optimized random forest algorithm is conceived then combined with Android malware behavioral portrait to detect Android malware. The evaluation findings indicate the DroidPortrait can depict behavioral characteristics of Android malware comprehensive and detect them with high performance.
引用
收藏
页数:20
相关论文
共 50 条
  • [21] Challenges in Android Malware Analysis
    Tong, Valerie Viet Triem
    Lalande, Jean Francois
    Leslous, Mourad
    ERCIM NEWS, 2016, (106): : 42 - +
  • [22] The analysis of android malware behaviors
    Department of Computer and Information Engineering, Huainan Normal University, Huainan, China
    Int. J. Secur. Appl., 3 (335-346):
  • [23] Framework for malware analysis in Android
    Urcuqui Lopez, Christian Camilo
    Navarro Cadavid, Andres
    SISTEMAS & TELEMATICA, 2016, 14 (37): : 45 - 56
  • [24] The Analysis of Android Malware Behaviors
    Fan Yuhui
    Xu Ning
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 335 - 345
  • [25] Android malware analysis in a nutshell
    Almomani, Iman
    Ahmed, Mohanned
    El-Shafai, Walid
    PLOS ONE, 2022, 17 (07):
  • [26] A Comparative Analysis of Android Malware
    Chavan, Neeraj
    Di Troia, Fabio
    Stamp, Mark
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 664 - 673
  • [27] TRAPDROID: Bare-Metal Android Malware Behavior Analysis Framework
    Alptekin, Halit
    Yildizli, Can
    Savas, Erkay
    Levi, Albert
    2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION, 2019, : 664 - 671
  • [28] Android Malware Network Behavior Analysis at HTTP Protocol Packet Level
    Wang, Shanshan
    Hou, Shifeng
    Zhang, Lei
    Chen, Zhenxiang
    Han, Hongbo
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 497 - 507
  • [29] A Design of Network Behavior-Based Malware Detection System for Android
    Qi, Yincheng
    Cao, Mingjing
    Zhang, Can
    Wu, Ruping
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2014, PT II, 2014, 8631 : 590 - 600
  • [30] DroidChain: A novel Android malware detection method based on behavior chains
    Wang, Zhaoguo
    Li, Chenglong
    Yuan, Zhenlong
    Guan, Yi
    Xue, Yibo
    PERVASIVE AND MOBILE COMPUTING, 2016, 32 : 3 - 14