Anomadroid: profiling Android applications' behaviors for identifying unknown malapps

被引:0
|
作者
Su, Dan [1 ]
Wang, Wei [1 ]
Wang, Xing [1 ]
Liu, Jiqiang [1 ]
机构
[1] Beijing Jiaotong Univ, Sch Comp & Informat Technol, Beijing, Peoples R China
关键词
Android security; anomaly detection; malware detection;
D O I
10.1109/TrustCom.2016.126
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Android has dominated the market of mobile devices. Meanwhile, it has become the main target for attackers. How to detect and analyze Android malicious applications (malapps) is an ongoing challenge. Current malapps have become increasingly sophisticated. In particular, zero-day (unknown) malapps appear very frequently and can evade most detection systems that are based on the signatures or patterns of existing malapps. In this work, we propose a system called Anomadroid (anomaly Android malapp detection system) that profiles the normal behaviors of Android apps based on only benign samples. Any app whose behaviors unacceptably deviate from the normal profile is identified as malicious. We firstly extract 4209 features that are divided into 9 categories such as permissions and APIs, from each app for the profiling. We then use term frequency-inverse document frequency (tf-idf) and employ k-Nearest Neighbor (k-NN) and Principal Component Analysis (PCA) for anomaly detection. We evaluate Anomadroid on a large app set consisting of 15,000 benign apps as well as 1500 malapps. The experimental results show that our system is better than existing methods and achieves a detection rate as 94.08% with false positive rate as 16.15%.
引用
收藏
页码:691 / 698
页数:8
相关论文
共 46 条
  • [21] Identifying and structuring service functions of mobile applications in Google's Android Market
    Suh, Yongyoon
    Park, Yongtae
    INFORMATION SYSTEMS AND E-BUSINESS MANAGEMENT, 2018, 16 (02) : 383 - 406
  • [22] Keystroke Dynamics as a Language Profiling Tool: Identifying Mother Tongue of Unknown Internet Users
    Tsimperidis, Ioannis
    Grunova, Denitsa
    Roy, Soumen
    Moussiades, Lefteris
    TELECOM, 2023, 4 (03): : 369 - 377
  • [23] Identifying Architectural Technical Debt in Android Applications through Automated Compliance Checking
    Verdecchia, Roberto
    2018 IEEE/ACM 5TH INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS (MOBILESOFT), 2018, : 35 - 36
  • [24] GranDroid: Graph-Based Detection of Malicious Network Behaviors in Android Applications
    Li, Zhiqiang
    Sun, Jun
    Yan, Qiben
    Srisa-an, Witawas
    Bachala, Shakthi
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I, 2018, 254 : 264 - 280
  • [25] Exploring Sensor Usage Behaviors of Android Applications Based on Data Flow Analysis
    Liu, Xing
    Liu, Jiqiang
    Wang, Wei
    2015 IEEE 34TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2015,
  • [26] Detecting injected behaviors in HTML']HTML5-based Android applications
    Mao, Jian
    Wang, Ruilong
    Chen, Yue
    Jia, Yaoqi
    JOURNAL OF HIGH SPEED NETWORKS, 2016, 22 (01) : 15 - 34
  • [27] Extractocol: Automatic Extraction of Application-level Protocol Behaviors for Android Applications
    Choi, Hyunwoo
    Kim, Jeongmin
    Hong, Hyunwook
    Kim, Yongdae
    Lee, Jonghyup
    Han, Dongsu
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2015, 45 (04) : 593 - +
  • [28] Extractocol: Automatic Extraction of Application-level Protocol Behaviors for Android Applications
    Choi, Hyunwoo
    Kim, Jeongmin
    Hong, Hyunwook
    Kim, Yongdae
    Lee, Jonghyup
    Han, Dongsu
    SIGCOMM'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION, 2015, : 593 - 594
  • [29] Identifying android malicious repackaged applications by thread-grained system call sequences
    Lin, Ying-Dar
    Lai, Yuan-Cheng
    Chen, Chien-Hung
    Tsai, Hao-Chuan
    COMPUTERS & SECURITY, 2013, 39 : 340 - 350
  • [30] A Study on Identifying Battery-Draining Android Applications in Screen-Off State
    Kurihara, Shun
    Fukuda, Shoki
    Yamaguchi, Saneyasu
    Koyanagi, Ayano
    Oguchi, Masato
    Kubota, Ayumu
    Nakarai, Akihiro
    2015 IEEE 4TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), 2015, : 603 - 604