Monet: A User-Oriented Behavior-Based Malware Variants Detection System for Android

被引:68
|
作者
Sun, Mingshen [1 ,2 ]
Li, Xiaolei [3 ]
Lui, John C. S. [1 ,2 ]
Ma, Richard T. B. [3 ]
Liang, Zhenkai [3 ]
机构
[1] Chinese Univ Hong Kong, Dept Comp Sci & Engn, Sha Tin, Peoples R China
[2] Natl Univ Singapore, Singapore 119077, Singapore
[3] Natl Univ Singapore, Sch Comp, Singapore 119077, Singapore
关键词
Malware detection; android; runtime behavior; static structure;
D O I
10.1109/TIFS.2016.2646641
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Android, the most popular mobile OS, has around 78% of the mobile market share. Due to its popularity, it attracts many malware attacks. In fact, people have discovered around 1 million new malware samples per quarter, and it was reported that over 98% of these new malware samples are in fact "derivatives" (or variants) from existing malware families. In this paper, we first show that runtime behaviors of malware's core functionalities are in fact similar within a malware family. Hence, we propose a framework to combine "runtime behavior" with "static structures" to detect malware variants. We present the design and implementation of MONET, which has a client and a backend server module. The client module is a lightweight, in-device app for behavior monitoring and signature generation, and we realize this using two novel interception techniques. The backend server is responsible for large scale malware detection. We collect 3723 malware samples and top 500 benign apps to carry out extensive experiments of detecting malware variants and defending against malware transformation. Our experiments show that MONET can achieve around 99% accuracy in detecting malware variants. Furthermore, it can defend against ten different obfuscation and transformation techniques, while only incurs around 7% performance overhead and about 3% battery overhead. More importantly, MONET will automatically alert users with intrusion details so to prevent further malicious behaviors.
引用
收藏
页码:1103 / 1112
页数:10
相关论文
共 50 条
  • [41] IS USER-ORIENTED DIALOG BEHAVIOR FEASIBLE WITHOUT A MODEL OF THE USER
    KOBSA, A
    TROST, H
    TRAPPL, R
    [J]. ANGEWANDTE INFORMATIK, 1983, (09): : 383 - 387
  • [42] Research on Android Malware Detection and Interception Based on Behavior Monitoring
    PENG Guojun1
    2. School of Computer
    [J]. Wuhan University Journal of Natural Sciences, 2012, 17 (05) : 421 - 427
  • [43] Automated Android Malware Detection Using User Feedback
    Duque, Joao
    Mendes, Goncalo
    Nunes, Luis
    de Almeida, Ana
    Serrao, Carlos
    [J]. SENSORS, 2022, 22 (17)
  • [44] A user-oriented ontology-based approach for network intrusion detection
    Hung, Shao-Shin
    Liu, Damon Shing-Min
    [J]. COMPUTER STANDARDS & INTERFACES, 2008, 30 (1-2) : 78 - 88
  • [45] A versatile and user-oriented versioning file system
    Muniswamy-Reddy, KK
    Wright, CP
    Himmer, A
    Zadok, E
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 3RD USENIX CONFERENCE ON FILE AND STORAGE TECHNOLOGIES, 2004, : 115 - 128
  • [46] BYPASSING PROFESSIONAL PROGRAMMERS - A USER-ORIENTED SYSTEM
    SCHEFF, BH
    [J]. DATAMATION, 1966, 12 (10): : 65 - &
  • [47] The development of behavior-based user models for a computer system
    Bushey, R
    Mauney, JM
    Deelman, T
    [J]. UM99: USER MODELING, PROCEEDINGS, 1999, (407): : 109 - 118
  • [48] User-oriented reliability modeling for a web system
    Wang, WL
    Tang, MH
    [J]. ISSRE 2003: 14TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS, 2003, : 293 - 304
  • [49] On Malware Detection in the Android Operating System
    Badami, Charles
    Kettani, Houssain
    [J]. 4TH INTERNATIONAL CONFERENCE ON ALGORITHMS, COMPUTING AND SYSTEMS, ICACS 2020, 2020, : 45 - 50
  • [50] User-Oriented Preference Toward a Recommender System
    Lin, Pei-Chun
    Arbaiy, Nureize
    [J]. BAGHDAD SCIENCE JOURNAL, 2021, 18 (01) : 746 - 752