skip to main content
10.1145/3325730.3325772acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicmaiConference Proceedingsconference-collections
research-article

Android Malicious Application Detection Method Based on Multi-class Characteristics

Authors Info & Claims
Published:12 April 2019Publication History

ABSTRACT

With the development of malicious applications on the Android platform, detection methods for malicious applications have gradually become a hot research content. The existing analysis methods have some shortcomings: on the one hand, the same algorithm cannot fully detect different features; on the other hand, more and more malicious code uses dynamic loading mechanism. In view of the above limitations, this paper proposes a method to detect different features by using a variety of classification algorithms. First, two types of permissions to be applied for detection and function call are extracted. Mutual information processing is used to reduce data that has little impact on classification. Then, different classification algorithms are used for calculation to select the optimal algorithm for the two characteristic attributes. Finally, according to the optimal algorithm to determine whether the application to be detected belongs to malicious applications Experimental results show that the proposed method has a high recognition rate and can effectively identify malicious applications.

References

  1. Li Y, Jin Z, An android malware detection method based on feature codes{C}//International Conference on Mechatronics, Materials Chemistry and Computer Engieering, 2015:2690--2694.Google ScholarGoogle Scholar
  2. Wu S, Wang P, Li X, et al. Effective detection of android malware based on the usage of data flow APIs and machine learning {J}//Information & Software Technology, 2016, 75(C):17--25.Google ScholarGoogle Scholar
  3. Sato R, Chiba D, Goto S, Detecting android malware by analyzing manifest files{C}//Asia Pacific Advanced Network, 2013. 23--31.Google ScholarGoogle Scholar
  4. Junaid M, Liu D, Kung D. Dexteroid: detecting malicious behaviors in Android apps using reverse engineered life cycle models{J}//Computer & Security, 2016, 59:92--117.Google ScholarGoogle Scholar
  5. Wang W, Wang X, Feng D W, et al. Exploring Permission Induced Risk in Android Applications for Malicious Application Detection{J}//IEEE Transaction On Information Forensics and Security, 2014, 9(11):1869--1882.Google ScholarGoogle Scholar
  6. Nauman M, Khan S, Zhang X. Apex: extending android permission model and enforcementwith user-defined runtime constraints{C}//Proceedings of the 5th ACM Symposium on Informatin, Computer and Communications Security. 2010:328--332. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Mistry N, Padariya N. Review of behavior malware analysis for android{J}//International Journal of Engineering and Innovative Technology, 2013, 2(7):230--232.Google ScholarGoogle Scholar
  8. Enck W, Gilbert P, Chun B G, et al. TaintDroid: An information flow tracking system for realtime privacy monitoring on smartphones{C}//Usenix Symposium on Operating Systems Design and Implementation(OSDI 2010). 2010:393--407. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Zhang Y, Yang M, Xu B, et al. Vetting undesirable behaviors in Android apps with permission use analysis{C}//The 20th ACM Conference on Computer and Communications Security. 2013:611--622. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Nishimoto Y, Kajiwara N, Matsumoto S, et al. Detection of Android API Call Using Logging Mechanism within Android Framework{C}// International Conference on Security and Privacy in Communication System.2013:393--404.Google ScholarGoogle Scholar
  11. Enck W, Ongtang M, McDaniel P. Understanding android security. IEEE Security & Privacy, 2009, 7(1):50--57. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Wu Z Z, Chen X Y, Yang Zhi, et al. Optimal mining on android permission configuration{J}. Journal of Chinese Computer System, 2015, 36(10):2354--2359.Google ScholarGoogle Scholar
  13. Zhou Y J, Jiang X X, Dissecting android malware: Characterization and evolution{C}//Proceeding of the IEEE Symposium on Security and Privacy. 2012:1063--1069. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Wu DJ, Mao CH, Wei TE, et al. DroidMat:Android malware detection through manifest and API calls tracing. Proc. of the 7th Asia Joint Conference on Information Security. Tokyo, Japan. 2012.62--69. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Android Malicious Application Detection Method Based on Multi-class Characteristics

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICMAI '19: Proceedings of the 2019 4th International Conference on Mathematics and Artificial Intelligence
      April 2019
      232 pages
      ISBN:9781450362580
      DOI:10.1145/3325730

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 12 April 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader