Predicting the Impact of Android Malicious Samples via Machine Learning

被引:12
|
作者
Qiu, Junyang [1 ]
Luo, Wei [1 ]
Pan, Lei [1 ]
Tai, Yonghang [2 ]
Zhang, Jun [3 ]
Xiang, Yang [3 ]
机构
[1] Deakin Univ, Sch Informat Technol, Geelong, Vic 3216, Australia
[2] Yunnan Normal Univ, Sch Phys & Elect Informat, Kunming 650500, Yunnan, Peoples R China
[3] Swinburne Univ Technol, Sch Software & Elect Engn, Melbourne, Vic 3122, Australia
关键词
Android malware; deep neural network; high impact malicious samples; low impact malicious samples; static analysis; SVM; NEURAL-NETWORKS;
D O I
10.1109/ACCESS.2019.2914311
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Android malicious samples threaten billions of mobile end users' security or privacy. The community researchers have designed many methods to automatically and accurately identify Android malware samples. However, the rapid increase of Android malicious samples outpowers the capabilities of traditional Android malware detectors and classifiers with respect to the cyber security risk management needs. It is important to identify the small proportion of Android malicious samples that may produce high cyber-security or privacy impact. In this paper, we propose a light-weight solution to automatically identify the Android malicious samples with high security and privacy impact. We manually check a number of Android malware families and corresponding security incidents and define two impact metrics for Android malicious samples. Our investigation results in a new Android malware dataset with impact ground truth (low impact or high impact). This new dataset is employed to empirically investigate the intrinsic characteristics of low-impact as well as high-impact malicious samples. To characterize and capture Android malicious samples' pattern, reverse engineering is performed to extract semantic features to represent malicious samples. The leveraged features are parsed from both the AndroidManifest.xml files as well as the disassembled binary classes.dex codes. Then, the extracted features are embedded into numerical vectors. Furthermore, we train highly accurate support vector machine and deep neural network classifiers to categorize the candidate Android malicious samples into low impact or high impact. The empirical results validate the effectiveness of our designed light-weight solution. This method can be further utilized for identifying those high-impact Android malicious samples in the wild.
引用
收藏
页码:66304 / 66316
页数:13
相关论文
共 50 条
  • [21] Androanalyzer: Android Malicious Software Detection Based on Deep Learning
    Arslan R.S.
    PeerJ Computer Science, 2021, 7 : 1 - 20
  • [22] AndroAnalyzer: android malicious software detection based on deep learning
    Arslan, Recep Sinan
    PEERJ COMPUTER SCIENCE, 2021,
  • [23] MadDroid: malicious adware detection in Android using deep learning
    Seraj, Saeed
    Pavlidis, Michalis
    Trovati, Marcello
    Polatidis, Nikolaos
    Journal of Cyber Security Technology, 2024, 8 (03) : 163 - 190
  • [24] Android malicious code detection and recognition based on depth learning
    Jing, Yang
    PROCEEDINGS OF THE 2017 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTER (MACMC 2017), 2017, 150 : 179 - 183
  • [25] KFFPDet: Android malicious application detection system with assisted detection of adversarial samples
    Kong, Ke
    Wang, Luhua
    Zhang, Zhaoxin
    Li, Yikang
    Zhao, Dong
    Huang, Junkai
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 252
  • [26] The Impact of Missing Continuous Blood Glucose Samples on Machine Learning Models for Predicting Postprandial Hypoglycemia: An Experimental Analysis
    Rehman, Najib Ur
    Contreras, Ivan
    Beneyto, Aleix
    Vehi, Josep
    MATHEMATICS, 2024, 12 (10)
  • [27] Detection of malicious URLs using machine learning
    Reyes-Dorta, Nuria
    Caballero-Gil, Pino
    Rosa-Remedios, Carlos
    WIRELESS NETWORKS, 2024, 30 (09) : 7543 - 7560
  • [28] Classification of Malicious URLs Using Machine Learning
    Abad, Shayan
    Gholamy, Hassan
    Aslani, Mohammad
    SENSORS, 2023, 23 (18)
  • [29] BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals
    Xu, Fenghao
    Diao, Wenrui
    Li, Zhou
    Chen, Jiongyi
    Zhang, Kehuan
    26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,
  • [30] A Software Environment for Confining Malicious Android Applications via Resource Virtualization
    Li, Xiaolei
    Bai, Guangdong
    Liang, Zhenkai
    Yin, Heng
    2013 18TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS), 2013, : 208 - 211