A Mobile Malware Detection Method Based on Malicious Subgraphs Mining

被引:2
|
作者
Du, Yao [1 ]
Cui, Mengtian [1 ]
Cheng, Xiaochun [2 ]
机构
[1] Southwest Minzu Univ, Key Lab Comp Syst, State Ethn Affairs Commiss, Chengdu 610041, Sichuan, Peoples R China
[2] Middlesex Univ, Dept Comp Sci, London NW44BE, England
关键词
FEATURE-SELECTION;
D O I
10.1155/2021/5593178
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As mobile phone is widely used in social network communication, it attracts numerous malicious attacks, which seriously threaten users' personal privacy and data security. To improve the resilience to attack technologies, structural information analysis has been widely applied in mobile malware detection. However, the rapid improvement of mobile applications has brought an impressive growth of their internal structure in scale and attack technologies. It makes the timely analysis of structural information and malicious feature generation a heavy burden. In this paper, we propose a new Android malware identification approach based on malicious subgraph mining to improve the detection performance of large-scale graph structure analysis. Firstly, function call graphs (FCGs), sensitive permissions, and application programming interfaces (APIs) are generated from the decompiled files of malware. Secondly, two kinds of malicious subgraphs are generated from malware's decompiled files and put into the feature set. At last, test applications' safety can be automatically identified and classified into malware families by matching their FCGs with malicious structural features. To evaluate our approach, a dataset of 11,520 malware and benign applications is established. Experimental results indicate that our approach has better performance than three previous works and Androguard.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Malicious sequential pattern mining for automatic malware detection
    Fan, Yujie
    Ye, Yanfang
    Chen, Lifei
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2016, 52 : 16 - 25
  • [2] Mining Mobile Internet Packets for Malware Detection
    Jin, Haifeng
    Cui, Baojiang
    Wang, Jianxin
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 481 - 486
  • [3] Malware Hiding Malicious Code in the Image and its Detection Method
    Kumagai, Ryo
    Takemoto, Shu
    Nozaki, Yusuke
    Yoshikawa, Masaya
    [J]. IEEJ Transactions on Electronics, Information and Systems, 2022, 142 (12): : 1288 - 1294
  • [4] Service-oriented mobile malware detection system based on mining strategies
    Cui, Baojiang
    Jin, Haifeng
    Carullo, Giuliana
    Liu, Zheli
    [J]. PERVASIVE AND MOBILE COMPUTING, 2015, 24 : 101 - 116
  • [5] DDOFM: Dynamic malicious domain detection method based on feature mining
    Wang, Han
    Tang, Zhangguo
    Li, Huanzhou
    Zhang, Jian
    Cai, Cheng
    [J]. Computers and Security, 2023, 130
  • [6] Lexical Mining of Malicious URLs for Classifying Android Malware
    Wang, Shanshan
    Yan, Qiben
    Chen, Zhenxiang
    Wang, Lin
    Spolaor, Riccardo
    Yang, Bo
    Conti, Mauro
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I, 2018, 254 : 248 - 263
  • [7] Android Malware Clustering Through Malicious Payload Mining
    Li, Yuping
    Jang, Jiyong
    Hu, Xin
    Ou, Xinming
    [J]. RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES (RAID 2017), 2017, 10453 : 192 - 214
  • [8] A Malicious Mining Code Detection Method Based on Multi-Features Fusion
    Li, Shudong
    Jiang, Laiyuan
    Zhang, Qianqing
    Wang, Zhen
    Tian, Zhihong
    Guizani, Mohsen
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (05): : 2731 - 2739
  • [9] Mining and Detection of Anaroia Malware Based on Permissions
    Sahal, Abdirashid Ahmed
    Alam, Shahid
    Sogukpinar, Ibrahim
    [J]. 2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2018, : 264 - 268
  • [10] Mobile Internet Malicious Application Detection Method based on Support Vector Machine
    Jing, Li
    [J]. 2017 INTERNATIONAL CONFERENCE ON SMART GRID AND ELECTRICAL AUTOMATION (ICSGEA), 2017, : 260 - 263