DroidPortrait: Android Malware Portrait Construction Based on Multidimensional Behavior Analysis

被引:12
|
作者
Su, Xin [1 ,2 ]
Xiao, Lijun [3 ]
Li, Wenjia [4 ]
Liu, Xuchong [1 ,2 ]
Li, Kuan-Ching [5 ]
Liang, Wei [6 ]
机构
[1] Hunan Police Acad, Hunan Prov Key Lab Network Invest Technol, Changsha 410000, Peoples R China
[2] Hunan Police Acad, Big Data Intelligence Police Hunan Prov Engn Res, Changsha 410000, Peoples R China
[3] Guangzhou Coll Technol & Business, Big Data Dev & Res Ctr, Guangzhou 510006, Peoples R China
[4] New York Inst Technol, Dept Comp Sci, New York, NY 10023 USA
[5] Providence Univ, Dept Comp Sci & Informat Engn, Taichung 43301, Taiwan
[6] Hunan Univ, Coll Informat Sci & Engn, Changsha 41000, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2020年 / 10卷 / 11期
关键词
Android malware; behavioral portrait; behavioral tag; machine learning; USER AUTHENTICATION SCHEME; SMART CARD;
D O I
10.3390/app10113978
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Recently, security incidents such as sensitive data leakage and video/audio hardware control caused by Android malware have raised severe security issues that threaten Android users, so thus behavior analysis and detection research researches of malicious Android applications have become a hot topic. However, the behavioral portrait of Android malware that can depict the behavior of Android malware is not approached in previous literature. To fill this gap, we propose DroidPortrait, an Android malware multi-dimensional behavioral portrait construction approach. We take the behavior of Android malware as an entry point and extract an informative behavior dataset that includes static and dynamic behavior from Android malware. Next, aiming at Android malware that contains different kinds of behaviors, a behavioral tag is defined then combined with a machine learning (ML) algorithm to implement the correlation of these behavioral tags. Android malware behavioral portrait architecture based on behavior analysis and its design is investigated, as also an optimized random forest algorithm is conceived then combined with Android malware behavioral portrait to detect Android malware. The evaluation findings indicate the DroidPortrait can depict behavioral characteristics of Android malware comprehensive and detect them with high performance.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] Android Malware Analysis and Conceptual Malware Mitigation Approaches
    Oh, Tae
    Kim, Young Ho
    Moon, Hwa Shin
    Kim, Jeong Neyo
    Stackpole, Bill
    2016 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC 2016): TOWARDS SMARTER HYPER-CONNECTED WORLD, 2016, : 684 - 693
  • [32] DroidChain: A Novel Malware Detection Method for Android based on Behavior Chain
    Wang, Zhaoguo
    Li, Chenglong
    Guan, Yi
    Xue, Yibo
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 727 - 728
  • [33] Design and Analysis of Push Notification-Based Malware on Android
    Hyun, Sangwon
    Cho, Junsung
    Cho, Geumhwan
    Kim, Hyoungshick
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [34] New Results on Permission Based Static Analysis for Android Malware
    Sahin, Durmus Ozkan
    Kural, Oguz Emre
    Akleylek, Sedat
    Kilic, Erdal
    2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 340 - 343
  • [35] Attack Tree Based Android Malware Detection with Hybrid Analysis
    Zhao, Shuai
    Li, Xiaohong
    Xu, Guangquan
    Zhang, Lei
    Feng, Zhiyong
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 380 - 387
  • [36] An Assistive System for Android Malware Analysis to Increase Malware Analysis Efficiency
    Jadhav, Suyash
    Oh, Tae
    Jeong, Jaehoon
    Kim, Young Ho
    Kim, Jeong Neyo
    2017 31ST IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (IEEE WAINA 2017), 2017, : 370 - 374
  • [37] Android Malware Detection Based on Static Analysis of Characteristic Tree
    Li, Qi
    Li, Xiaoyu
    2015 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY, 2015, : 84 - 91
  • [38] IntDroid: Android Malware Detection Based on API Intimacy Analysis
    Zou, Deqing
    Wu, Yueming
    Yang, Siru
    Chauhan, Anki
    Yang, Wei
    Zhong, Jiangying
    Dou, Shihan
    Jin, Hai
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021, 30 (03)
  • [39] Visual Analysis of Android Malware Behavior Profile Based on PMCGdroid: A Pruned Lightweight APP Call Graph
    Zhang, Yan
    Peng, Gui
    Yang, Lu
    Wang, Yazhe
    Tian, Minghui
    Hu, Jianxing
    Wang, Liming
    Song, Chen
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 238 : 449 - 468
  • [40] Benchmarking Android Malware Analysis Tools
    Higuera, Javier Bermejo
    Moreno, Javier Morales
    Higuera, Juan Ramon Bermejo
    Montalvo, Juan Antonio Sicilia
    Martillo, Gustavo Javier Barreiro
    Riera, Tomas Miguel Sureda
    ELECTRONICS, 2024, 13 (11)