On the use of artificial malicious patterns for android malware detection

被引:34
|
作者
Jerbi, Manel [1 ]
Dagdia, Zaineb Chelly [2 ,3 ]
Bechikh, Slim [1 ]
Ben Said, Lamjed [1 ]
机构
[1] Univ Tunis, SMART Lab, ISG Campus, Tunis, Tunisia
[2] Univ Lorraine, LORIA, INRIA, CNRS, F-54000 Nancy, France
[3] Inst Super Gest Tunis, LARODEC, Tunis, Tunisia
基金
欧盟地平线“2020”;
关键词
Malware detection; API call sequences; Artificial malicious patterns; Evolutionary algorithm; Android; CLASSIFICATION; SYSTEM;
D O I
10.1016/j.cose.2020.101743
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware programs currently represent the most serious threat to computer information systems. Despite the performed efforts of researchers in this field, detection tools still have limitations for one main reason. Actually, malware developers usually use obfuscation techniques consisting in a set of transformations that make the code and/or its execution difficult to analyze by hindering both manual and automated inspections. These techniques allow the malware to escape the detection tools, and hence to be seen as a benign program. To solve the obfuscation issue, many researchers have proposed to extract frequent Application Programming Interface (API) call sequences from previously encountered malware programs using pattern mining techniques and hence, build a base of fraudulent behaviors. Based on this process, it is worth mentioning that the performance of the detection process heavily depends on the base of examples of malware behaviors; also called malware patterns. In order to deal with this shortcoming, a dynamic detection method called Artificial Malware-based Detection (AMD) is proposed in this paper. AMD makes use of not only extracted malware patterns but also artificially generated ones. The artificial malware patterns are generated using an evolutionary (genetic) algorithm. The latter evolves a population of API call sequences with the aim to find new malware behaviors following a set of well-defined evolution rules. The artificial fraudulent behaviors are subsequently inserted into the base of examples in order to enrich it with unseen malware patterns. The main motivation behind the proposed AMD approach is to diversify the base of malware examples in order to maximize the detection rate. AMD has been tested on different Android malware data sets and compared against recent prominent works using commonly employed performance metrics. The performance analysis of the obtained results shows the merits of our AMD novel approach. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] MsDroid: Identifying Malicious Snippets for Android Malware Detection
    He, Yiling
    Li, Yiping
    Wu, Lei
    Yang, Ziqi
    Ren, Kui
    Qin, Zhan
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) : 2025 - 2039
  • [2] Android Malware Detection Using Artificial Intelligence
    Masele, Rebecca Kipanga
    Khennou, Fadoua
    [J]. INFORMATION AND SOFTWARE TECHNOLOGIES, ICIST 2023, 2024, 1979 : 53 - 67
  • [3] Android malware detection based on sensitive patterns
    Kang Liu
    Guanghui Zhang
    Xue Chen
    Qing Liu
    Linyu Peng
    Liu Yurui
    [J]. Telecommunication Systems, 2023, 82 : 435 - 449
  • [4] Android Malware Detection with Contrasting Permission Patterns
    Xiong Ping
    Wang Xiaofeng
    Niu Wenjia
    Zhu Tianqing
    Li Gang
    [J]. CHINA COMMUNICATIONS, 2014, 11 (08) : 1 - 14
  • [5] Android malware detection based on sensitive patterns
    Liu, Kang
    Zhang, Guanghui
    Chen, Xue
    Liu, Qing
    Peng, Linyu
    Yurui, Liu
    [J]. TELECOMMUNICATION SYSTEMS, 2023, 82 (04) : 435 - 449
  • [6] A Proposed Artificial Intelligence Model for Android-Malware Detection
    Taher, Fatma
    Al Fandi, Omar
    Al Kfairy, Mousa
    Al Hamadi, Hussam
    Alrabaee, Saed
    [J]. INFORMATICS-BASEL, 2023, 10 (03):
  • [7] Android Malware Detection Using Feature Fusion and Artificial Data
    Shahzad, Raja Khurram
    [J]. 2018 16TH IEEE INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP, 16TH IEEE INT CONF ON PERVAS INTELLIGENCE AND COMP, 4TH IEEE INT CONF ON BIG DATA INTELLIGENCE AND COMP, 3RD IEEE CYBER SCI AND TECHNOL CONGRESS (DASC/PICOM/DATACOM/CYBERSCITECH), 2018, : 702 - 709
  • [8] Lexical Mining of Malicious URLs for Classifying Android Malware
    Wang, Shanshan
    Yan, Qiben
    Chen, Zhenxiang
    Wang, Lin
    Spolaor, Riccardo
    Yang, Bo
    Conti, Mauro
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I, 2018, 254 : 248 - 263
  • [9] Enhancing Malware Detection for Android Apps: Detecting Fine-granularity Malicious Components
    Liu, Zhijie
    Zhang, Liang Feng
    Tang, Yutian
    [J]. 2023 38TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, ASE, 2023, : 1212 - 1224
  • [10] Android Malware Clustering Through Malicious Payload Mining
    Li, Yuping
    Jang, Jiyong
    Hu, Xin
    Ou, Xinming
    [J]. RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES (RAID 2017), 2017, 10453 : 192 - 214