Detecting Malicious Android Applications from Runtime Behavior

被引:0
|
作者
Lageman, Nathaniel [1 ]
Lindsey, Mark [1 ]
Glodek, William [2 ]
机构
[1] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
[2] US Army Res Lab, Adelphi, MD USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As of 2011, the Android market has already surpassed the Apple App Store in number of applications. Along with this increase in applications, also comes an increase in number of malicious applications. In response, there has been extensive research done with behavioral analysis and detection methods using system calls, CPU usage, and anomaly-based detection. In this paper, we extend upon these previous works by using logcat and strace outputs to generate runtime datasets of both malicious and benign applications. Using these datasets, we generate feature sets to be used for classification. We test the effectiveness of both a Random Forest classifier and a Support Vector Machine on this feature set. We see the Random Forest classifier perform well with true positive rates exceeding 90% while maintaining a false positive rate less than 6%.
引用
收藏
页码:324 / 329
页数:6
相关论文
共 50 条
  • [1] Detecting Applications with Malicious Behavior in Android Device Based on GA and SVM
    Liu, Ning
    Yang, Min
    Zhang, Shibin
    [J]. PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL AND AUTOMATION ENGINEERING (ECAE 2017), 2017, 140 : 257 - 261
  • [2] A Hidden Markov Model Detection of Malicious Android Applications at Runtime
    Chen, Yang
    Ghorbanzadeh, Mo
    Ma, Kevin
    Clancy, Charles
    McGwier, Robert
    [J]. 2014 23RD WIRELESS AND OPTICAL COMMUNICATION CONFERENCE (WOCC), 2014,
  • [3] Automatically Detecting Malicious Sensitive Data Usage in Android Applications
    Yan, Hongbing
    Xiong, Yan
    Huang, Wenchao
    Huang, Jianmeng
    Meng, Zhaoyi
    [J]. 2018 4TH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM 2018), 2018, : 102 - 107
  • [4] Detecting malicious Android applications based on the network packets generated
    de la Puerta, Jose Gaviria
    Pastor-Lopez, Iker
    Porto, Igone
    Sanz, Borja
    Garcia Bringas, Pablo
    [J]. NEUROCOMPUTING, 2021, 456 : 629 - 636
  • [5] MineRBS: Detecting Android Malware Based on Runtime Behavior Sequence
    Jin, Hao
    Li, Yangyang
    Yang, Ying
    [J]. 2020 12TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2020), 2020, : 216 - 222
  • [6] Applying Natural Language Processing for detecting malicious patterns in Android applications
    Alam, Shahid
    [J]. FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2021, 39
  • [7] Constructing Features for Detecting Android Malicious Applications: Issues, Taxonomy and Directions
    Wang, Wei
    Zhao, Meichen
    Gao, Zhenzhen
    Xu, Guangquan
    Xian, Hequn
    Li, Yuanyuan
    Zhang, Xiangliang
    [J]. IEEE ACCESS, 2019, 7 : 67602 - 67631
  • [8] Detecting Malicious Behavior in Microservice Based Web Applications
    Ozbek, Mustafa
    Sandikkaya, Mehmet Tahir
    [J]. 2019 27TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2019,
  • [9] Android Collusion: Detecting Malicious Applications Inter-Communication through SharedPreferences
    Casolare, Rosangela
    Martinelli, Fabio
    Mercaldo, Francesco
    Santone, Antonella
    [J]. INFORMATION, 2020, 11 (06)
  • [10] Smartphone Dual Defense Protection Framework: Detecting malicious applications in Android Markets
    Su, X.
    Chuah, M.
    Tan, G.
    [J]. 2012 EIGHTH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR NETWORKS (MSN 2012), 2012, : 153 - 160