当前位置: X-MOL 学术J. Inf. Secur. Appl. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A TAN based hybrid model for android malware detection
Journal of Information Security and Applications ( IF 3.8 ) Pub Date : 2020-05-23 , DOI: 10.1016/j.jisa.2020.102483
Roopak Surendran , Tony Thomas , Sabu Emmanuel

Android devices are very popular because of their availability at reasonable prices. However, there is a rapid rise of malware applications in Android platform in the recent past years due to its security vulnerabilities. The existing static malware detection mechanisms can locate malicious components associated with the source code of an application and dynamic analysis can identify exploits in the runtime environment. Hence, the advantages of both static and dynamic mechanisms need to be combined to form a hybrid analysis mechanism for achieving better accuracy in malware detection. The existing machine learning based hybrid malware analysis mechanisms do not check the interdependency of static and dynamic features used in their machine learning classifiers. This interdependency can lead to multicollinearity problem which can affect the classifier’s performance. Hence, in this paper we propose a novel TAN (Tree Augmented naive Bayes) based hybrid malware detection mechanism by employing the conditional dependencies among relevant static and dynamic features (API calls, permissions and system calls) which are required for the functionality of an application. We trained three ridge regularized logistic regression classifiers corresponding to API calls, permission and system calls of an application and modeled their output relationships as a TAN (Tree Augmented naive Bayes) for identifying whether the application is malicious or not. The experimental results show that the proposed mechanism can detect malicious applications over a long period with an accuracy of 0.97.



中文翻译:

用于Android恶意软件检测的基于TAN的混合模型

Android设备之所以受欢迎,是因为其价格合理。但是,由于安全漏洞,最近几年Android平台中的恶意软件应用程序迅速增加。现有的静态恶意软件检测机制可以找到与应用程序源代码关联的恶意组件,而动态分析可以识别运行时环境中的漏洞。因此,需要将静态和动态机制的优点结合起来,以形成一种混合分析机制,以实现恶意软件检测中更高的准确性。现有的基于机器学习的混合恶意软件分析机制无法检查其机器学习分类器中使用的静态和动态功能的相互依赖性。这种相互依赖性可能导致多重共线性问题,从而影响分类器的性能。因此,在本文中,我们通过利用应用程序功能所需的相关静态和动态功能(API调用,权限和系统调用)之间的条件依赖关系,提出了一种新颖的基于TAN(树增强朴素贝叶斯)的混合恶意软件检测机制。 。我们训练了三个与应用程序的API调用,权限和系统调用相对应的脊正则化逻辑回归分类器,并将它们的输出关系建模为TAN(树增强朴素贝叶斯),以识别应用程序是否恶意。实验结果表明,该机制可以长时间检测出恶意应用,准确率达0.97。在本文中,我们通过利用应用程序功能所需的相关静态和动态功能(API调用,权限和系统调用)之间的条件依赖关系,提出了一种基于TAN(树增强朴素贝叶斯)的新型混合恶意软件检测机制。我们训练了三个与应用程序的API调用,权限和系统调用相对应的脊正则化逻辑回归分类器,并将它们的输出关系建模为TAN(树增强朴素贝叶斯),以识别应用程序是否恶意。实验结果表明,该机制可以长时间检测出恶意应用程序,准确性为0.97。在本文中,我们通过利用应用程序功能所需的相关静态和动态功能(API调用,权限和系统调用)之间的条件依赖性,提出了一种基于TAN(树增强朴素贝叶斯)的新型混合恶意软件检测机制。我们训练了三个与应用程序的API调用,权限和系统调用相对应的正则化逻辑回归分类器,并将它们的输出关系建模为TAN(树增强朴素贝叶斯),以识别应用程序是否恶意。实验结果表明,该机制可以长时间检测出恶意应用,准确率达0.97。

更新日期:2020-05-23
down
wechat
bug