On Existence of Common Malicious System Call Codes in Android Malware Families

被引:19
|
作者
Surendran, Roopak [1 ]
Thomas, Tony [1 ]
Emmanuel, Sabu [2 ]
机构
[1] Cochin Univ Sci & Technol, Indian Inst Informat Technol & Management Kerala, Res Ctr, Thiruvananthapuram 695581, Kerala, India
[2] Indian Inst Technol, Dept Elect Engn, Palakkad 678557, India
关键词
Malware; Androids; Humanoid robots; Machine learning; Markov processes; Feature extraction; Static analysis; Asymptotic equipartition property (AEP); android malware; dynamic malware detection; ergodic Markov chain; system calls;
D O I
10.1109/TR.2020.2982537
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Most of the existing Android malware detection mechanisms are based on machine learning algorithms. The problem with the machine learning approaches is the difficulty in finding the best features that uniquely characterize the malwares. Hence, in this article we explore the property that uniquely characterizes Android malware applications. Toward this, we model the system call sequence generated by a malware application as a stationary first-order ergodic Markov chain and prove the existence of typical patterns which contains the malicious system call code of the application. In our implementation, we find the occurrence of common malicious system call codes in the system call sequence of several malware families. Finally a malware detection mechanism is proposed based on the occurrence of malicious system call codes in the system call sequence of an application. We obtain a consistent accuracy of around 0.95 in balanced, slightly unbalanced, and highly unbalanced data sets. In the balanced and slightly unbalanced data sets we obtain greater precision than 0.90; whereas in the highly unbalanced data sets the precision obtained are slightly lower at 0.72.
引用
收藏
页码:248 / 260
页数:13
相关论文
共 50 条
  • [21] Identifying android malicious repackaged applications by thread-grained system call sequences
    Lin, Ying-Dar
    Lai, Yuan-Cheng
    Chen, Chien-Hung
    Tsai, Hao-Chuan
    COMPUTERS & SECURITY, 2013, 39 : 340 - 350
  • [22] Comparison of Machine Learning Methods for Android Malicious Software Classification based on System Call
    Anshori, Mochammad
    Mar'i, Farhanna
    Bachtiar, Fitra A.
    PROCEEDINGS OF 2019 4TH INTERNATIONAL CONFERENCE ON SUSTAINABLE INFORMATION ENGINEERING AND TECHNOLOGY (SIET 2019), 2019, : 343 - 348
  • [23] Android Mobile Application System Call Event Pattern Analysis for Determination of Malicious Attack
    Ham, You Joung
    Moon, Daeyeol
    Lee, Hyung-Woo
    Lim, Jae Deok
    Kim, Jeong Nyeo
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 231 - 246
  • [24] Enhancing malware detection for Android systems using a system call filtering and abstraction process
    Amamra, Abdelfattah
    Robert, Jean-Marc
    Talhi, Chamseddine
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (07) : 1179 - 1192
  • [25] Android Mobile Malware Classification using Tokenization Approach based on System Call Sequence
    Ahmad, Intan Nurfarahin
    Ridzuan, Farida
    Saudi, Madihah Mohd
    Pitchay, Sakinah Ali
    Basir, Nurlida
    Nabila, N. F.
    WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, WCECS 2017, VOL I, 2017, : 85 - 90
  • [26] Covalent Bond Based Android Malware Detection Using Permission and System Call Pairs
    Gupta, Rahul
    Sharma, Kapil
    Garg, R. K.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (03): : 4283 - 4301
  • [27] AMDroid: Android Malware Detection Using Function Call Graphs
    Ge, Xiuting
    Pan, Ya
    Fang, Chunrong
    Fan, Yong
    2019 COMPANION OF THE 19TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS-C 2019), 2019, : 71 - 77
  • [28] Predicting Android malware combining permissions and API call sequences
    Chen, Xin
    Yu, Haihua
    Yu, Dongjin
    Chen, Jie
    Sun, Xiaoxiao
    SOFTWARE QUALITY JOURNAL, 2023, 31 (03) : 655 - 685
  • [29] Android Malware Detection Method Based on Function Call Graphs
    Ding, Yuxin
    Zhu, Siyi
    Xia, Xiaoling
    NEURAL INFORMATION PROCESSING, ICONIP 2016, PT IV, 2016, 9950 : 70 - 77
  • [30] Evading android anti-malware by hiding malicious application inside images
    Badhani, Shikha
    Muttoo, Sunil K.
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2018, 9 (02) : 482 - 493