Mining Frequent Patterns for Scalable and Accurate Malware Detection System in Android

被引:0
|
作者
Thi-Tra-My Nguyen [1 ]
Dong-Son Nguyen [1 ]
Van Tong [1 ]
Duc Tran [1 ]
Hai-Anh Tran [1 ]
Mellouk, Abdelhamid [2 ]
机构
[1] Ha Noi Univ Sci & Technol, Bach Khoa Cybersecur Ctr, Hanoi, Vietnam
[2] UPEC, Dept Networks & Telecoms IUT CV, Image Signal & Intelligent Syst Lab, Creteil, France
关键词
malware detection; frequent pattern; apriori; fp-growth;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Nowadays, the high interest of Android applications makes them the target of a huge number of malware. To detect this severe increase of Android malware and help end-users make a better evaluation of apps at install time, several approaches have been proposed such as statistic and dynamic approaches. However, these approaches cannot detect with high accuracy unfamiliar malware types. That inspired us to find a new approach for recognizing a malware basing on the anomalous set of permission it requests. To actualize that idea, we used the theory of frequent patterns, a data mining technique, for mining the frequent combination of requested permissions. We also compare the performance of the proposed system to other malware detection applications. Experimental results show that the proposed system yielded high accuracy with approximately 97 percent of normal applications and 86 percent of abnormal applications.
引用
收藏
页码:370 / 375
页数:6
相关论文
共 50 条
  • [1] Andrana: Quick and Accurate Malware Detection for Android
    Bedford, Andrew
    Garvin, Sebastien
    Desharnais, Josee
    Tawbi, Nadia
    Ajakan, Hana
    Audet, Frederic
    Lebel, Bernard
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2016, 2017, 10128 : 20 - 35
  • [2] BRIDEMAID: An Hybrid Tool for Accurate Detection of Android Malware
    Martinelli, Fabio
    Mercaldo, Francesco
    Saracino, Andrea
    [J]. PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 899 - 901
  • [3] Android Malware Detection with Contrasting Permission Patterns
    Xiong Ping
    Wang Xiaofeng
    Niu Wenjia
    Zhu Tianqing
    Li Gang
    [J]. CHINA COMMUNICATIONS, 2014, 11 (08) : 1 - 14
  • [4] Android malware detection based on sensitive patterns
    Liu, Kang
    Zhang, Guanghui
    Chen, Xue
    Liu, Qing
    Peng, Linyu
    Yurui, Liu
    [J]. TELECOMMUNICATION SYSTEMS, 2023, 82 (04) : 435 - 449
  • [5] Android malware detection based on sensitive patterns
    Kang Liu
    Guanghui Zhang
    Xue Chen
    Qing Liu
    Linyu Peng
    Liu Yurui
    [J]. Telecommunication Systems, 2023, 82 : 435 - 449
  • [6] Mining API Calls and Permissions for Android Malware Detection
    Sharma, Akanksha
    Dash, Subrat Kumar
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2014, 2014, 8813 : 191 - 205
  • [7] DMDAM: Data Mining Based Detection of Android Malware
    Bhattacharya, Abhishek
    Goswami, Radha Tamal
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND COMMUNICATION, 2017, 458 : 187 - 194
  • [8] On Malware Detection in the Android Operating System
    Badami, Charles
    Kettani, Houssain
    [J]. 4TH INTERNATIONAL CONFERENCE ON ALGORITHMS, COMPUTING AND SYSTEMS, ICACS 2020, 2020, : 45 - 50
  • [9] Adaptive and Scalable Android Malware Detection through Online Learning
    Narayanan, Annamalai
    Liu Yang
    Chen, Lihui
    Liu Jinliang
    [J]. 2016 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2016, : 2484 - 2491
  • [10] A scalable and extensible framework for android malware detection and family attribution
    Zhang, Li
    Thing, Vrizlynn L. L.
    Cheng, Yao
    [J]. COMPUTERS & SECURITY, 2019, 80 : 120 - 133