Detecting Malicious Android Applications from Runtime Behavior

被引:0
|
作者
Lageman, Nathaniel [1 ]
Lindsey, Mark [1 ]
Glodek, William [2 ]
机构
[1] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
[2] US Army Res Lab, Adelphi, MD USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As of 2011, the Android market has already surpassed the Apple App Store in number of applications. Along with this increase in applications, also comes an increase in number of malicious applications. In response, there has been extensive research done with behavioral analysis and detection methods using system calls, CPU usage, and anomaly-based detection. In this paper, we extend upon these previous works by using logcat and strace outputs to generate runtime datasets of both malicious and benign applications. Using these datasets, we generate feature sets to be used for classification. We test the effectiveness of both a Random Forest classifier and a Support Vector Machine on this feature set. We see the Random Forest classifier perform well with true positive rates exceeding 90% while maintaining a false positive rate less than 6%.
引用
收藏
页码:324 / 329
页数:6
相关论文
共 50 条
  • [31] Visualizing Android Malicious Applications Using Texture Features
    Sharma, Tejpal
    Rattan, Dhavleesh
    INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2023, 23 (06)
  • [32] On the Efficacy of Static Features to Detect Malicious Applications in Android
    Geneiatakis, Dimitris
    Satta, Riccardo
    Fovino, Igor Nai
    Neisse, Ricardo
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2015, 9264 : 87 - 98
  • [33] Android-SRV: Scenario-Based Runtime Verification of Android Applications
    Zhang, Pengcheng
    Cheng, Kun
    Gao, Jerry
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2018, 28 (02) : 239 - 257
  • [34] DecaDroid Classification and Characterization of Malicious Behaviour in Android Applications
    Gupta, Charu
    Singh, Rakesh Kumar
    Bhatia, Simran Kaur
    Mohapatra, Amar Kumar
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2020, 14 (04) : 57 - 73
  • [35] ApkClassiFy: Identification and Classification of packed Android Malicious Applications
    Guo, Xu
    Zheng, Tao
    Chen, Xingshu
    Wang, Qixu
    Shao, Jiang
    Hu, Zhijie
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 2092 - 2097
  • [36] A Novel Approach to Restrict the Access of Malicious Applications in Android
    Dar, Muneer Ahmad
    2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2017,
  • [37] Runtime-environment Testing Method for Android Applications
    Huang, Song
    Yang, Sen
    Hui, Zhanwei
    Yao, Yongming
    Chen, Lele
    Liu, Jialuo
    Chen, Qiang
    2019 COMPANION OF THE 19TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS-C 2019), 2019, : 534 - 535
  • [38] DroidScribe: Classifying Android Malware Based on Runtime Behavior
    Dash, Santanu Kumar
    Suarez-Tangil, Guillermo
    Khan, Salahuddin
    Tam, Kimberly
    Ahmadi, Mansour
    Kinder, Johannes
    Cavallaro, Lorenzo
    2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016), 2016, : 252 - 261
  • [39] Malicious Behavior Analysis of Android GUI Based on ADB
    Yang, Li
    Wang, Lijun
    Zhang, Dongdong
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 2, 2017, : 147 - 153
  • [40] Modeling and Capturing Malicious Behavior to Detect Android Malware
    El AassaL, Ayman
    Huang, Shou-Hsuan Stephen
    PROCEEDINGS OF NINTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, VOL 2, ICICT 2024, 2024, 1012 : 325 - 335