Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection

被引:246
|
作者
Wang, Wei [1 ]
Wang, Xing [1 ]
Feng, Dawei [2 ]
Liu, Jiqiang [1 ]
Han, Zhen [1 ]
Zhang, Xiangliang [3 ]
机构
[1] Beijing Jiaotong Univ, Sch Comp & Informat Technol, Beijing 100044, Peoples R China
[2] Natl Univ Def Technol, Changsha 410073, Hunan, Peoples R China
[3] King Abdullah Univ Sci & Technol, Div Comp Elect & Math Sci & Engn, Thuwal 239556900, Saudi Arabia
关键词
Android system; Android security; permission usage analysis; malware detection; intrusion detection;
D O I
10.1109/TIFS.2014.2353996
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Android has been a major target of malicious applications (malapps). How to detect and keep the malapps out of the app markets is an ongoing challenge. One of the central design points of Android security mechanism is permission control that restricts the access of apps to core facilities of devices. However, it imparts a significant responsibility to the app developers with regard to accurately specifying the requested permissions and to the users with regard to fully understanding the risk of granting certain combinations of permissions. Android permissions requested by an app depict the app's behavioral patterns. In order to help understanding Android permissions, in this paper, we explore the permission-induced risk in Android apps on three levels in a systematic manner. First, we thoroughly analyze the risk of an individual permission and the risk of a group of collaborative permissions. We employ three feature ranking methods, namely, mutual information, correlation coefficient, and T-test to rank Android individual permissions with respect to their risk. We then use sequential forward selection as well as principal component analysis to identify risky permission subsets. Second, we evaluate the usefulness of risky permissions for malapp detection with support vector machine, decision trees, as well as random forest. Third, we in depth analyze the detection results and discuss the feasibility as well as the limitations of malapp detection based on permission requests. We evaluate our methods on a very large official app set consisting of 310 926 benign apps and 4868 real-world malapps and on a third-party app sets. The empirical results show that our malapp detectors built on risky permissions give satisfied performance (a detection rate as 94.62% with a false positive rate as 0.6%), catch the malapps' essential patterns on violating permission access regulations, and are universally applicable to unknown malapps (detection rate as 74.03%).
引用
收藏
页码:1869 / 1882
页数:14
相关论文
共 50 条
  • [21] A Hidden Markov Model Detection of Malicious Android Applications at Runtime
    Chen, Yang
    Ghorbanzadeh, Mo
    Ma, Kevin
    Clancy, Charles
    McGwier, Robert
    2014 23RD WIRELESS AND OPTICAL COMMUNICATION CONFERENCE (WOCC), 2014,
  • [22] A detection model of malicious Android applications based on Naive Bayes
    Wang, Chundong
    Zhao, Yi
    Mo, Xiuliang
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2019, 11 (04) : 508 - 515
  • [23] Malicious Application Traffic Detection and Identification for Mobile Android Devices
    Niu, Geng
    INFORMATICA-AN INTERNATIONAL JOURNAL OF COMPUTING AND INFORMATICS, 2022, 46 (08): : 67 - 72
  • [24] Machine Learning-Based Malicious Application Detection of Android
    Wei, Linfeng
    Luo, Weiqi
    Weng, Jian
    Zhong, Yanjun
    zhang, Xiaoqian
    Yan, Zheng
    IEEE ACCESS, 2017, 5 : 25591 - 25601
  • [25] Android Malicious Application Detection Based on Improved Mayfly Algorithm
    Wei, Yinzhen
    Lu, Shuo
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1845 - 1852
  • [26] Malicious Application Traffic Detection and Identification for Mobile Android Devices
    Niu, Geng
    Informatica (Slovenia), 2022, 46 (08): : 67 - 72
  • [27] KFFPDet: Android malicious application detection system with assisted detection of adversarial samples
    Kong, Ke
    Wang, Luhua
    Zhang, Zhaoxin
    Li, Yikang
    Zhao, Dong
    Huang, Junkai
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 252
  • [28] Study on the Application of Dalvik Injection Technique for the Detection of Malicious Programs in Android
    Li, Yingbo
    Fang, Jing
    Liu, Cheng
    Liu, Mengrong
    Wu, ShaoHua
    PROCEEDINGS OF 2015 IEEE 5TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION, 2015, : 309 - 312
  • [29] Android application classification and anomaly detection with graph-based permission patterns
    Sokolova, Karina
    Perez, Charles
    Lemercier, Marc
    DECISION SUPPORT SYSTEMS, 2017, 93 : 62 - 76
  • [30] An Android application risk evaluation framework based on minimum permission set identification
    Xiao, Jianmao
    Chen, Shizhan
    He, Qiang
    Feng, Zhiyong
    Xue, Xiao
    JOURNAL OF SYSTEMS AND SOFTWARE, 2020, 163