APP-NTS: a network traffic similarity-based framework for repacked Android apps detection

被引:0
|
作者
Mohammed Alshehri
机构
[1] Majmaah University,Department of Information Technology, College of Computer and Information Sciences
关键词
Malware repackaging; Network traffic analysis; Vantage point and time complexity;
D O I
暂无
中图分类号
学科分类号
摘要
The popularity of Android brings much functionality to its users but it also brings many threats. Repacked Android application is one such threat which is the root of many other threats such as malware, phishing, adware, and economical loss. Earlier many techniques have been proposed for the detection of repacked application but they have their limitations and bottlenecks. The issue of malware and duplicate apps affecting the smartphones are being reported on a large scale and has drawn the attention of many researchers. Major of these issues target Android-based phones. Repackaged apps are usually infected versions of popular apps. Adversaries download a popular Android app, and obtain the code using reverse engineering and then add their code (often malicious) to it and repackage and release the app. The existing methods focus primarily on the extraction of apps’ behavior and comparing the same with their static code. These have the least chance of detecting the code obfuscation and the dynamic behavior of apps. Therefore, a framework of App-NTS is proposed which extracts the dynamic behavior of the apps from the network traffic analysis. The dynamic vantage point algorithm used for the comparative analysis of the apps’ behavior, which significantly helps in reducing the time complexity. Experimental analysis has detected 365 repacked apps from 8645 apps that are downloaded from various online markets and have also brought dramatic results in terms of better performance with Mean Square Error value decreased by 41% and Log loss reduced by 35.2%. There is an increase in accuracy of 18.3% when compared to other states of the art techniques.
引用
收藏
页码:1537 / 1546
页数:9
相关论文
共 50 条
  • [2] A neural network framework for similarity-based prognostics
    Bektas, Oguz
    Jones, Jeffrey A.
    Sankararaman, Shankar
    Roychoudhury, Indranil
    Goebel, Kai
    METHODSX, 2019, 6 : 383 - 390
  • [3] TraceDroid: A Robust Network Traffic Analysis Framework for Privacy Leakage in Android Apps
    Cui, Huajun
    Meng, Guozhu
    Zhang, Yan
    Wang, Weiping
    Zhu, Dali
    Su, Ting
    Zhang, Xiaodong
    Li, Yuejun
    SCIENCE OF CYBER SECURITY, SCISEC 2022, 2022, 13580 : 541 - 556
  • [4] AndroMalPack: enhancing the ML-based malware classification by detection and removal of repacked apps for Android systems
    Husnain Rafiq
    Nauman Aslam
    Muhammad Aleem
    Biju Issac
    Rizwan Hamid Randhawa
    Scientific Reports, 12
  • [5] Network-based detection of Android malicious apps
    Shree Garg
    Sateesh K. Peddoju
    Anil K. Sarje
    International Journal of Information Security, 2017, 16 : 385 - 400
  • [6] Network-based detection of Android malicious apps
    Garg, Shree
    Peddoju, Sateesh K.
    Sarje, Anil K.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (04) : 385 - 400
  • [7] AndroMalPack: enhancing the ML-based malware classification by detection and removal of repacked apps for Android systems
    Rafiq, Husnain
    Aslam, Nauman
    Aleem, Muhammad
    Issac, Biju
    Randhawa, Rizwan Hamid
    SCIENTIFIC REPORTS, 2022, 12 (01)
  • [8] Similarity-based community detection in social network of microblog
    Sun, Yifan
    Li, Sai
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2014, 51 (12): : 2797 - 2807
  • [9] Simulating Realistic IoT Network Traffic Using Similarity-based DSE
    Brand, Peter
    Falk, Joachim
    Maier, Tanja
    Teich, Juergen
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2021), 2021, : 1377 - 1380
  • [10] Android App Recommendation Approach Based on Network Traffic Measurement and Analysis
    Su, Xin
    Zhang, Dafang
    Li, Wenjia
    Li, Wenwei
    2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2015, : 988 - 994