Lexical Mining of Malicious URLs for Classifying Android Malware

被引:0
|
作者
Wang, Shanshan [1 ]
Yan, Qiben [2 ]
Chen, Zhenxiang [1 ]
Wang, Lin [1 ]
Spolaor, Riccardo [3 ]
Yang, Bo [1 ]
Conti, Mauro [3 ]
机构
[1] Univ Jinan, Shandong Prov Key Lab Network Based Intelligent C, Jinan, Peoples R China
[2] Univ Nebraska, Dept Comp Sci & Engn, Lincoln, NE 68588 USA
[3] Univ Padua, Dept Math, Padua, Italy
基金
中国国家自然科学基金;
关键词
D O I
10.1007/978-3-030-01701-9_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The prevalence of mobile malware has become a growing issue given the tight integration of mobile systems with our daily life. Most malware programs use URLs inside network traffic to forward commands to launch malicious activities. Therefore, the detection of malicious URLs can be essential in deterring such malicious activities. Traditional methods construct blacklists with verified URLs to identify malicious URLs, but their effectiveness is impaired by unknown malicious URLs. Recently, machine learning-based methods have been proposed for malware detection with improved performance. In this paper, we propose a novel URL detection method based on Floating Centroids Method (FCM), which integrates supervised classification and unsupervised clustering in a coherent manner. The proposed method uses the lexical features of a URL to effectively identify malicious URLs while grouping similar URLs into the same cluster. Our experimental results show that a URL cluster exhibits unique behavioral patterns that can be used for malware detection with high accuracy. Moreover, the proposed behavioral clustering method facilitates the identification of malicious URL categories and unseen malware variants.
引用
收藏
页码:248 / 263
页数:16
相关论文
共 50 条
  • [21] Towards Understanding the Role of Execution Context for Observing Malicious Behavior in Android Malware
    Boileau, Catherine
    Gagnon, Francois
    Poisson, Jeremie
    Frenette, Simon
    Mejri, Mohammed
    [J]. E-BUSINESS AND TELECOMMUNICATIONS (ICETE 2016), 2017, 764 : 48 - 71
  • [22] An Implemention of a Mechanism for Malicious URLs Detection
    Bhagwat, Animesh
    Lodhi, Kuldeep
    Dalvi, Shreyas
    Kulkarni, Umesh
    [J]. PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 1008 - 1013
  • [23] Detecting malicious short URLs on Twitter
    Nepali, Raj Kumar
    Wang, Yong
    Alshboul, Yazan
    [J]. AMCIS 2015 PROCEEDINGS, 2015,
  • [24] Mining permission patterns for contrasting clean and malicious android applications
    Moonsamy, Veelasha
    Rong, Jia
    Liu, Shaowu
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 36 : 122 - 132
  • [25] Process mining meets malware evolution : a study of the behavior of malicious code
    Bernardi, Mario Luca
    Cimitile, Marta
    Mercaldo, Francesco
    [J]. 2016 FOURTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2016, : 616 - 622
  • [26] Detecting Android Malware and Classifying Its Families in Large-scale Datasets
    Sun, Bo
    Takahashi, Takeshi
    Ban, Tao
    Inoue, Daisuke
    [J]. ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS, 2022, 13 (02)
  • [27] Deep and broad URL feature mining for android malware detection
    Wang, Shanshan
    Chen, Zhenxiang
    Yan, Qiben
    Ji, Ke
    Peng, Lizhi
    Yang, Bo
    Conti, Mauro
    [J]. INFORMATION SCIENCES, 2020, 513 : 600 - 613
  • [28] Research on data mining of permissions mode for Android malware detection
    Wang, Chao
    Xu, Qingzhen
    Lin, Xiuli
    Liu, Shouqiang
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 6): : 13337 - 13350
  • [29] Research on data mining of permissions mode for Android malware detection
    Chao Wang
    Qingzhen Xu
    Xiuli Lin
    Shouqiang Liu
    [J]. Cluster Computing, 2019, 22 : 13337 - 13350
  • [30] Detecting and Classifying Android Malware Using Static Analysis along with Creator Information
    Kang, Hyunjae
    Jang, Jae-wook
    Mohaisen, Aziz
    Kim, Huy Kang
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,