Predicting the Impact of Android Malicious Samples via Machine Learning

被引:12
|
作者
Qiu, Junyang [1 ]
Luo, Wei [1 ]
Pan, Lei [1 ]
Tai, Yonghang [2 ]
Zhang, Jun [3 ]
Xiang, Yang [3 ]
机构
[1] Deakin Univ, Sch Informat Technol, Geelong, Vic 3216, Australia
[2] Yunnan Normal Univ, Sch Phys & Elect Informat, Kunming 650500, Yunnan, Peoples R China
[3] Swinburne Univ Technol, Sch Software & Elect Engn, Melbourne, Vic 3122, Australia
关键词
Android malware; deep neural network; high impact malicious samples; low impact malicious samples; static analysis; SVM; NEURAL-NETWORKS;
D O I
10.1109/ACCESS.2019.2914311
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Android malicious samples threaten billions of mobile end users' security or privacy. The community researchers have designed many methods to automatically and accurately identify Android malware samples. However, the rapid increase of Android malicious samples outpowers the capabilities of traditional Android malware detectors and classifiers with respect to the cyber security risk management needs. It is important to identify the small proportion of Android malicious samples that may produce high cyber-security or privacy impact. In this paper, we propose a light-weight solution to automatically identify the Android malicious samples with high security and privacy impact. We manually check a number of Android malware families and corresponding security incidents and define two impact metrics for Android malicious samples. Our investigation results in a new Android malware dataset with impact ground truth (low impact or high impact). This new dataset is employed to empirically investigate the intrinsic characteristics of low-impact as well as high-impact malicious samples. To characterize and capture Android malicious samples' pattern, reverse engineering is performed to extract semantic features to represent malicious samples. The leveraged features are parsed from both the AndroidManifest.xml files as well as the disassembled binary classes.dex codes. Then, the extracted features are embedded into numerical vectors. Furthermore, we train highly accurate support vector machine and deep neural network classifiers to categorize the candidate Android malicious samples into low impact or high impact. The empirical results validate the effectiveness of our designed light-weight solution. This method can be further utilized for identifying those high-impact Android malicious samples in the wild.
引用
收藏
页码:66304 / 66316
页数:13
相关论文
共 50 条
  • [1] A MACHINE LEARNING APPROACH TO THE DETECTION AND ANALYSIS OF ANDROID MALICIOUS APPS
    Shibija, K.
    Raymond, Joseph, V
    2018 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2018,
  • [2] Machine Learning-Based Malicious Application Detection of Android
    Wei, Linfeng
    Luo, Weiqi
    Weng, Jian
    Zhong, Yanjun
    zhang, Xiaoqian
    Yan, Zheng
    IEEE ACCESS, 2017, 5 : 25591 - 25601
  • [3] Machine learning and deep learning techniques for detecting malicious android applications: An empirical analysis
    Parnika Bhat
    Sunny Behal
    Kamlesh Dutta
    Proceedings of the Indian National Science Academy, 2023, 89 : 429 - 444
  • [4] Machine learning and deep learning techniques for detecting malicious android applications: An empirical analysis
    Bhat, Parnika
    Behal, Sunny
    Dutta, Kamlesh
    PROCEEDINGS OF THE INDIAN NATIONAL SCIENCE ACADEMY, 2023, 89 (03): : 429 - 444
  • [5] Android Malicious Application Detection Using Support Vector Machine and Active Learning
    Rashidi, Bahman
    Fung, Carol
    Bertino, Elisa
    2017 13TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2017,
  • [6] A machine learning technique for Android malicious attacks detection based on API calls
    AL-Akhrasa, Mousa
    Alghamdib, Saud
    Omarc, Hani
    Alshareefb, Hazzaa
    DECISION SCIENCE LETTERS, 2024, 13 (01) : 29 - 44
  • [7] Time and Computation Efficient Malicious Android Application Detection Using Machine Learning Techniques
    Saqlain, Sabbir Ahmed
    Bin Mahamud, Navid
    Paul, Mahit Kumar
    Sattar, A. H. M. Sarowar
    2019 5TH INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL ENGINEERING (ICAEE), 2019, : 536 - 540
  • [8] Comparison of Machine Learning Methods for Android Malicious Software Classification based on System Call
    Anshori, Mochammad
    Mar'i, Farhanna
    Bachtiar, Fitra A.
    PROCEEDINGS OF 2019 4TH INTERNATIONAL CONFERENCE ON SUSTAINABLE INFORMATION ENGINEERING AND TECHNOLOGY (SIET 2019), 2019, : 343 - 348
  • [9] Detecting Malicious Android Game Applications on Third-Party Stores Using Machine Learning
    Sanamontre, Thanaporn
    Visoottiviseth, Vasaka
    Ragkhitwetsagul, Chaiyong
    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 4, AINA 2024, 2024, 202 : 238 - 251
  • [10] A machine learning based approach to detect malicious android apps using discriminant system calls
    Vinod, P.
    Zemmari, Akka
    Conti, Mauro
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 94 : 333 - 350