Detecting Malicious Applications using System Services Request Behavior

被引:10
|
作者
Salehi, Majid [1 ]
Amini, Morteza [2 ]
Crispo, Bruno [1 ,3 ]
机构
[1] Katholieke Univ Leuven, imec DistriNet, Leuven, Belgium
[2] Sharif Univ Technol, Tehran, Iran
[3] Trento Univ, Trento, Italy
基金
欧盟地平线“2020”;
关键词
Operating System; Android; Malware; Behavior Detection; MALWARE DETECTION;
D O I
10.1145/3360774.3360805
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Widespread growth in Android malware stimulates security researchers to propose different methods for analyzing and detecting malicious behaviors in applications. Nevertheless, current solutions are ill-suited to extract the fine-grained behavior of Android applications accurately and efficiently. In this paper, we propose ServiceMonitor, a lightweight host-based detection system that dynamically detects malicious applications directly on mobile devices. ServiceMonitor reconstructs the fine-grained behavior of applications based on their interaction with system services (i.e. SMS manager, camera, wifi networking, etc). ServiceMonitor monitors the way applications request system services in order to build a statistical Markov chain model to represent what and how system services are used. Afterwards, we use this Markov chain as a feature vector to classify the application behavior into either malicious or benign using the Random Forests classification algorithm. We evaluated ServiceMonitor using a dataset of 8034 malware and 10024 benign applications and obtaining 96.7% of accuracy rate and negligible overhead and performance penalty.
引用
收藏
页码:200 / 209
页数:10
相关论文
共 50 条
  • [1] FILEUPLOADCHECKER: Detecting and Sanitizing Malicious File Uploads inWeb Applications at the Request Level
    Wichmann, Pascal
    Groddeck, Alexander
    Federrath, Hannes
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [2] Detecting Malicious Behavior in Microservice Based Web Applications
    Ozbek, Mustafa
    Sandikkaya, Mehmet Tahir
    [J]. 2019 27TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2019,
  • [3] Detecting Malicious Android Applications from Runtime Behavior
    Lageman, Nathaniel
    Lindsey, Mark
    Glodek, William
    [J]. 2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 324 - 329
  • [4] Detecting Malicious Behavior and Collusion for Online Rating System
    Cao, Liu
    Sun, Yuqing
    Wang, Shaoqing
    Li, Mingzhu
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 1046 - 1053
  • [5] Detecting Malicious Facebook Applications
    Rahman, Sazzadur
    Huang, Ting-Kai
    Madhyastha, Harsha V.
    Faloutsos, Michalis
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (02) : 773 - 787
  • [6] ARP Request Trend Fitting for Detecting Malicious Activity in LAN
    Matsufuji, Kai
    Kobayashi, Satoru
    Esaki, Hiroshi
    Ochiai, Hideya
    [J]. PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION MANAGEMENT AND COMMUNICATION (IMCOM) 2019, 2019, 935 : 89 - 96
  • [7] Detecting Applications with Malicious Behavior in Android Device Based on GA and SVM
    Liu, Ning
    Yang, Min
    Zhang, Shibin
    [J]. PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL AND AUTOMATION ENGINEERING (ECAE 2017), 2017, 140 : 257 - 261
  • [8] DETECTING AND CONTAINING MALICIOUS SERVICES IN AN INTERCLOUD ENVIRONMENT
    Kapoor, Lohit
    Bawa, Seema
    Gupta, Ankur
    [J]. JOURNAL OF WEB ENGINEERING, 2016, 15 (5-6): : 521 - 538
  • [9] Detecting malicious behavior in cooperative diversity
    Dehnie, Sintayehu
    Sencar, Huserv T.
    Memon, Nasir
    [J]. 2007 41ST ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1 AND 2, 2007, : 895 - +
  • [10] MBTree: Detecting Encryption RATs Communication Using Malicious Behavior Tree
    Dong, Cong
    Lu, Zhigang
    Cui, Zelin
    Liu, Baoxu
    Chen, Kai
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 3589 - 3603