Malware Detection on Android Smartphones using Keywords Vector and SVM

被引:0
|
作者
Sun, Junmei [1 ]
Yan, Kai [1 ]
Liu, Xuejiao [1 ]
Yang, Chunlei [1 ]
Fu, Yaoyin [1 ]
机构
[1] Hangzhou Normal Univ, Hangzhou Inst Serv Engn, Hangzhou, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
Android; Malware; Keywords Correlation Distance; SVM;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of smart phones, more and more mobile phone malwares have came out in the market especially on the popular platforms such as Android, which can potentially cause harm to users' information. But how to effectively detect the new malwares and malicious software variants has been a difficult problem. In view of the traditional feature extraction method based on binary program, this paper presents a method for feature extraction of JAVA source code. The method uses the Keywords Correlation Distance to compute the correlation between key codes such as API calls, Android permissions, the common parameters, and the common key words in Android malware source code. Then SVM is applied to make the system gain to accommodate the function of the new malicious software sample, so as to detect new malicious software and existing malwares. This method is different from the conventional methods which are based on the context of the text. This method combines the characteristics of the malicious software categories and operating environment to record the behavior of the malicious software. Experiments show that the method is efficient and effective in detecting malwares on Android platform.
引用
收藏
页码:833 / 838
页数:6
相关论文
共 50 条
  • [41] IPDroid: Android Malware Detection using Intents and Permissions
    Khariwal, Kartik
    Singh, Jatin
    Arora, Anshul
    PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), 2020, : 197 - 202
  • [42] Android Malware Detection using Complex-Flows
    Shen, Feng
    Del Vecchio, Justin
    Mohaisen, Aziz
    Ko, Steven Y.
    Ziarek, Lukasz
    2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017), 2017, : 2430 - 2437
  • [43] Android Malware Detection Using TCN with Bytecode Image
    Zhang, Wenhui
    Luktarhan, Nurbol
    Ding, Chao
    Lu, Bei
    SYMMETRY-BASEL, 2021, 13 (07):
  • [44] Android Malware Detection Using Ensemble Feature Learning
    Rout, Siddhartha Suman
    Vashishtha, Lalit Kumar
    Chatterjee, Kakali
    Rout, Jitendra Kumar
    INFORMATION SYSTEMS AND MANAGEMENT SCIENCE, ISMS 2021, 2023, 521 : 531 - 539
  • [45] Android Malware Detection Using Machine Learning: A Review
    Chowdhury, Naseef-Ur-Rahman
    Haque, Ahshanul
    Soliman, Hamdy
    Hossen, Mohammad Sahinur
    Fatima, Tanjim
    Ahmed, Imtiaz
    INTELLIGENT SYSTEMS AND APPLICATIONS, VOL 3, INTELLISYS 2023, 2024, 824 : 507 - 522
  • [46] Deep Android Malware Detection
    McLaughlin, Niall
    del Rincon, Jesus Martinez
    Kang, BooJoong
    Yerima, Suleiman
    Miller, Paul
    Sezer, Sakir
    Safaei, Yeganeh
    Trickel, Erik
    Zhao, Ziming
    Doup, Adam
    Ahn, Gail Joon
    PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 301 - 308
  • [47] Detection of Repackaged Android Malware
    Shahriar, Hossain
    Clincy, Victor
    2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 349 - 354
  • [48] Smart malware detection on Android
    Gheorghe, Laura
    Marin, Bogdan
    Gibson, Gary
    Mogosanu, Lucian
    Deaconescu, Razvan
    Voiculescu, Valentin-Gabriel
    Carabas, Mihai
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4254 - 4272
  • [49] TRENDS IN ANDROID MALWARE DETECTION
    Shaerpour, Kaveh
    Dehghantanha, Ali
    Mahmod, Ramlan
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2013, 8 (03) : 21 - 40
  • [50] Scalable Detection of Web Malware on Smartphones
    Adas, Husam
    Shetty, Sachin
    Tayib, Waled
    2015 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY RESEARCH (ICTRC), 2015, : 198 - 201