APP-NTS: a network traffic similarity-based framework for repacked Android apps detection

被引:0
|
作者
Mohammed Alshehri
机构
[1] Majmaah University,Department of Information Technology, College of Computer and Information Sciences
关键词
Malware repackaging; Network traffic analysis; Vantage point and time complexity;
D O I
暂无
中图分类号
学科分类号
摘要
The popularity of Android brings much functionality to its users but it also brings many threats. Repacked Android application is one such threat which is the root of many other threats such as malware, phishing, adware, and economical loss. Earlier many techniques have been proposed for the detection of repacked application but they have their limitations and bottlenecks. The issue of malware and duplicate apps affecting the smartphones are being reported on a large scale and has drawn the attention of many researchers. Major of these issues target Android-based phones. Repackaged apps are usually infected versions of popular apps. Adversaries download a popular Android app, and obtain the code using reverse engineering and then add their code (often malicious) to it and repackage and release the app. The existing methods focus primarily on the extraction of apps’ behavior and comparing the same with their static code. These have the least chance of detecting the code obfuscation and the dynamic behavior of apps. Therefore, a framework of App-NTS is proposed which extracts the dynamic behavior of the apps from the network traffic analysis. The dynamic vantage point algorithm used for the comparative analysis of the apps’ behavior, which significantly helps in reducing the time complexity. Experimental analysis has detected 365 repacked apps from 8645 apps that are downloaded from various online markets and have also brought dramatic results in terms of better performance with Mean Square Error value decreased by 41% and Log loss reduced by 35.2%. There is an increase in accuracy of 18.3% when compared to other states of the art techniques.
引用
收藏
页码:1537 / 1546
页数:9
相关论文
共 50 条
  • [41] Network Traffic Anomaly Detection Based on Self-Similarity Using HHT and Wavelet Transform
    Cheng, Xiaorong
    Xie, Kun
    Wang, Dong
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 710 - 713
  • [42] Data mining-based integrated network traffic visualization framework for threat detection
    Bhardwaj, Amit Kumar
    Singh, Maninder
    NEURAL COMPUTING & APPLICATIONS, 2015, 26 (01): : 117 - 130
  • [43] Data mining-based integrated network traffic visualization framework for threat detection
    Amit Kumar Bhardwaj
    Maninder Singh
    Neural Computing and Applications, 2015, 26 : 117 - 130
  • [44] A fully scalable big data framework for Botnet detection based on network traffic analysis
    Mousavi, S. H.
    Khansari, M.
    Rahmani, R.
    INFORMATION SCIENCES, 2020, 512 : 629 - 640
  • [45] Evaluation Framework for Netflow-based Network Anomaly Detection Systems using Synthetic Malicious Network Traffic
    Bardhan, Shuvo
    Hatada, Mitsuhiro
    2022 IEEE 46TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2022), 2022, : 1474 - 1480
  • [46] Towards a Framework for the Generation of Enhanced Attack and Background Network Traffic for Evaluation of Network-Based Intrusion Detection Systems
    Lo, Owen
    Graves, Jamie
    Buchanan, William
    PROCEEDINGS OF THE 9TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 190 - 200
  • [47] Hybrid model for bot group activity detection using similarity and correlation approaches based on network traffic flows analysis
    Hostiadi, Dandy Pramana
    Ahmad, Tohari
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (07) : 4219 - 4232
  • [48] Deep-Full-Range: A Deep Learning Based Network Encrypted Traffic Classification and Intrusion Detection Framework
    Zeng, Yi
    Gu, Huaxi
    Wei, Wenting
    Guo, Yantao
    IEEE ACCESS, 2019, 7 : 45182 - 45190
  • [49] A Novel Split Learning-Based Consumer Electronics Network Traffic Anomaly Detection Framework for Smart City Environment
    Kim, Dong-Jo
    Amma, N. G. Bhuvaneswari
    Sarveshwaran, Velliangiri
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 4197 - 4204
  • [50] Improved chimp optimization algorithm (ICOA) feature selection and deep neural network framework for internet of things (IOT) based android malware detection
    G T.V.
    Fiza S.
    Kumar A.K.
    Devi V.S.
    Kumar C.N.
    Kubra A.
    G, Tirumala Vasu (tirumalavasu20@gmail.com), 2023, 28