LSTM Android Malicious Behavior Analysis Based on Feature Weighting

被引:1
|
作者
Yang, Qing [1 ,2 ]
Wang, Xiaoliang [3 ,4 ,5 ]
Zheng, Jing [2 ]
Ge, Wenqi [2 ]
Bai, Ming [1 ]
Jiang, Frank [2 ]
机构
[1] Guangzhou Maritime Univ, Sch Comp Sci & Informat Engn, Guangzhou 510725, Peoples R China
[2] Hunan Univ Sci & Technol, Xiangtan 411201, Peoples R China
[3] Hunan Univ Sci & Technol, Informat Technol, Xiangtan 411201, Peoples R China
[4] Hunan Univ Sci & Technol, Dept Internet Things Engn, Xiangtan 411201, Peoples R China
[5] Deakin Univ, Sch Info Technol, Geelong, Vic, Australia
关键词
Android Security; Deep Learning; LSTM; Static Analysis; TF-IDF;
D O I
10.3837/tiis.2021.06.014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of mobile Internet, smart phones have been widely popularized, among which Android platform dominates. Due to it is open source, malware on the Android platform is rampant. In order to improve the efficiency of malware detection, this paper proposes deep learning Android malicious detection system based on behavior features. First of all, the detection system adopts the static analysis method to extract different types of behavior features from Android applications, and extract sensitive behavior features through Term frequency-inverse Document Frequency algorithm for each extracted behavior feature to construct detection features through unified abstract expression. Secondly, Long Short Term Memory neural network model is established to select and learn from the extracted attributes and the learned attributes are used to detect Android malicious applications, Analysis and further optimization of the application behavior parameters, so as to build a deep learning Android malicious detection method based on feature analysis. We use different types of features to evaluate our method and compare it with various machine learning-based methods. Study shows that it outperforms most existing machine learning based approaches and detects 95.31% of the malware.
引用
收藏
页码:2188 / 2203
页数:16
相关论文
共 50 条
  • [31] JOWMDroid: Android malware detection based on feature weighting with joint optimization of weight-mapping and classifier parameters
    Cai, Lingru
    Li, Yao
    Xiong, Zhi
    [J]. Computers and Security, 2021, 100
  • [32] Unsupervised Feature Weighting Based on Local Feature Relatedness
    Yun, Jiali
    Jing, Liping
    Yu, Jian
    Huang, Houkuan
    [J]. ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PT I: 15TH PACIFIC-ASIA CONFERENCE, PAKDD 2011, 2011, 6634 : 38 - 49
  • [33] JOWMDroid: Android malware detection based on feature weighting with joint optimization of weight-mapping and classifier parameters
    Cai, Lingru
    Li, Yao
    Xiong, Zhi
    [J]. COMPUTERS & SECURITY, 2021, 100
  • [34] Sensitivity analysis of feature weighting for classification
    Dalwinder Singh
    Birmohan Singh
    [J]. Pattern Analysis and Applications, 2022, 25 : 819 - 835
  • [35] Sensitivity analysis of feature weighting for classification
    Singh, Dalwinder
    Singh, Birmohan
    [J]. PATTERN ANALYSIS AND APPLICATIONS, 2022, 25 (04) : 819 - 835
  • [36] A MACHINE LEARNING APPROACH TO THE DETECTION AND ANALYSIS OF ANDROID MALICIOUS APPS
    Shibija, K.
    Raymond, Joseph, V
    [J]. 2018 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2018,
  • [37] Intelligent Malicious URL Detection with Feature Analysis
    Chen, Yu-Chen
    Ma, Yi-Wei
    Chen, Jiann-Liang
    [J]. 2020 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2020, : 1142 - 1146
  • [38] A malicious behavior analysis based Cyber-I birth
    Wen, Jie
    Ma, Jianhua
    Huang, Runhe
    Jin, Qun
    Chen, Jian
    Huang, Benxiong
    Zhong, Ning
    [J]. JOURNAL OF INTELLIGENT MANUFACTURING, 2014, 25 (01) : 147 - 155
  • [39] Familial Analysis of Malicious Android Apps Controlling IOT Devices
    Maikap, Subhadhriti
    Kishore, Pushkar
    Barisal, Swadhin Kumar
    Mohapatra, Durga Prasad
    [J]. INTERNET OF THINGS AND CONNECTED TECHNOLOGIES, 2022, 340 : 205 - 214
  • [40] Malicious Code Detection: Run Trace Output Analysis by LSTM
    Acarturk, Cengiz
    Sirlanci, Melih
    Balikcioglu, Pinar Gurkan
    Demirci, Deniz
    Sahin, Nazenin
    Kucuk, Ozge Acar
    [J]. IEEE ACCESS, 2021, 9 : 9625 - 9635