Skip to main content

2018 | OriginalPaper | Buchkapitel

Detection of Android Applications with Malicious Behavior Based on Sparse Bayesian Learning Algorithm

verfasst von : Ning Liu, Min Yang, Hang Zhang, Chen Yang, Yang Zhao, Jianchao Gan, Shibin Zhang

Erschienen in: Cloud Computing and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Android mobile devices are widely used in recent years. Due to the openness of Android, applications with malicious behavior have more opportunities to get confidential information, which can cause property damage. Most of current solutions are hard to detect these rapidly developing malicious applications with high accuracy. In this paper, a static malicious application detection method based on Sparse Bayesian Learning Algorithm and n-gram analysis is proposed to solve this problem.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bergeron, J., Debbabi, M., Desharnais, J., Erhioui, M.M., Lavoie, Y., Tawbi, N.: Static detection of malicious code in executable programs. Int. J. Req. Eng. (2001) Bergeron, J., Debbabi, M., Desharnais, J., Erhioui, M.M., Lavoie, Y., Tawbi, N.: Static detection of malicious code in executable programs. Int. J. Req. Eng. (2001)
2.
Zurück zum Zitat Dhaya, R., Poongodi, M.: Detecting software vulnerabilities in android using static analysis. In: Proceedings of ICACCCT 2015, pp. 915–918 (2015) Dhaya, R., Poongodi, M.: Detecting software vulnerabilities in android using static analysis. In: Proceedings of ICACCCT 2015, pp. 915–918 (2015)
3.
Zurück zum Zitat Arzt, S., et al.: FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps. ACM SIGPLAN Not. 49(6), 259–269 (2014)CrossRef Arzt, S., et al.: FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps. ACM SIGPLAN Not. 49(6), 259–269 (2014)CrossRef
4.
Zurück zum Zitat Li, W., Ge, J., Dai, G.: Detecting malware for android platform: an SVM-based approach. In: Proceedings of CSCloud 2016, pp. 464–469 (2016) Li, W., Ge, J., Dai, G.: Detecting malware for android platform: an SVM-based approach. In: Proceedings of CSCloud 2016, pp. 464–469 (2016)
5.
Zurück zum Zitat Enck, W., Ongtang, M., Mcdaniel, P.: On lightweight mobile phone application certification. In: Proceedings of CCS 2009, pp. 235–245 (2009) Enck, W., Ongtang, M., Mcdaniel, P.: On lightweight mobile phone application certification. In: Proceedings of CCS 2009, pp. 235–245 (2009)
6.
Zurück zum Zitat Spreitzenbarth, M., Schreck, T., Echtler, F., Arp, D., Hoffmann, J.: Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques. Int. J. Inf. Secur. 14(2), 141–153 (2015)CrossRef Spreitzenbarth, M., Schreck, T., Echtler, F., Arp, D., Hoffmann, J.: Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques. Int. J. Inf. Secur. 14(2), 141–153 (2015)CrossRef
7.
Zurück zum Zitat Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., Weiss, Y.: “Andromaly”: a behavioral malware detection framework for android devices. J. Intell. Inf. Syst. 38(1), 161–190 (2012)CrossRef Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., Weiss, Y.: “Andromaly”: a behavioral malware detection framework for android devices. J. Intell. Inf. Syst. 38(1), 161–190 (2012)CrossRef
8.
Zurück zum Zitat Fuchs, A.P., Chaudhuri, A., Foster, J.S.: SCanDroid: automated security certification of Android applications (2010) Fuchs, A.P., Chaudhuri, A., Foster, J.S.: SCanDroid: automated security certification of Android applications (2010)
9.
Zurück zum Zitat Enck, W., et al.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of OSDI 2010, pp. 393–407 (2010) Enck, W., et al.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of OSDI 2010, pp. 393–407 (2010)
10.
Zurück zum Zitat Yan, L.K., Yin, H.: DroidScope: seamlessly reconstructing the OS and Dalvik semantic views for dynamic Android malware analysis. In: USENIX Security Symposium, p. 29 (2013) Yan, L.K., Yin, H.: DroidScope: seamlessly reconstructing the OS and Dalvik semantic views for dynamic Android malware analysis. In: USENIX Security Symposium, p. 29 (2013)
12.
Zurück zum Zitat Faruki, P., et al.: Android security: a survey of issues, malware penetration, and defenses. IEEE Commun. Surv. Tutor. 17(2), 998–1022 (2017)CrossRef Faruki, P., et al.: Android security: a survey of issues, malware penetration, and defenses. IEEE Commun. Surv. Tutor. 17(2), 998–1022 (2017)CrossRef
13.
Zurück zum Zitat Wen, W., Mei, R., Ning, G., Wang, L.: Malware detection technology analysis and applied research of android platform. J. Commun. 35, 78–85 (2014) Wen, W., Mei, R., Ning, G., Wang, L.: Malware detection technology analysis and applied research of android platform. J. Commun. 35, 78–85 (2014)
14.
Zurück zum Zitat Cavnar, W.B., Trenkle, J.M.: N-gram-based text categorization. In: 3rd Annual Symposium on Document Analysis and Information Retrieval, pp. 161–175 (1994) Cavnar, W.B., Trenkle, J.M.: N-gram-based text categorization. In: 3rd Annual Symposium on Document Analysis and Information Retrieval, pp. 161–175 (1994)
15.
Zurück zum Zitat Abou-Assaleh, T., Cercone, N., Keselj, V., Sweidan, R.: N-gram-based detection of new malicious code. In: Proceedings of COMPSAC 2004, pp. 41–42. IEEE (2004) Abou-Assaleh, T., Cercone, N., Keselj, V., Sweidan, R.: N-gram-based detection of new malicious code. In: Proceedings of COMPSAC 2004, pp. 41–42. IEEE (2004)
17.
Zurück zum Zitat Chen, T., Yang, Y., Bo, C.: Maldetect: an android malware detection system based on abstraction of Dalvik instructions. J. Comput. Res. Dev. 53(10), 2299–2306 (2016) Chen, T., Yang, Y., Bo, C.: Maldetect: an android malware detection system based on abstraction of Dalvik instructions. J. Comput. Res. Dev. 53(10), 2299–2306 (2016)
18.
Zurück zum Zitat Dong, H., Neng-Qiang, H.E., Ge, H.U., Qi, L.I., Zhang, M.: Malware detection method of android application based on simplification instructions. J. China Univ. Posts Telecommun. 21(23–24), 94–100 (2014)CrossRef Dong, H., Neng-Qiang, H.E., Ge, H.U., Qi, L.I., Zhang, M.: Malware detection method of android application based on simplification instructions. J. China Univ. Posts Telecommun. 21(23–24), 94–100 (2014)CrossRef
19.
Zurück zum Zitat Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273–297 (1995)MATH Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273–297 (1995)MATH
20.
Zurück zum Zitat Sanz, B., Santos, I., Laorden, C., Ugarte-Pedrero, X.: On the automatic categorisation of Android applications. In: Proceedings of CCNC 2012, pp. 149–153 (2012) Sanz, B., Santos, I., Laorden, C., Ugarte-Pedrero, X.: On the automatic categorisation of Android applications. In: Proceedings of CCNC 2012, pp. 149–153 (2012)
21.
Zurück zum Zitat Tipping, M.E.: Sparse bayesian learning and the relevance vector machine. JMLR.org (2001) Tipping, M.E.: Sparse bayesian learning and the relevance vector machine. JMLR.org (2001)
22.
Zurück zum Zitat Ye, Y., Chen, L., Wang, D., Li, T., Jiang, Q., Zhao, M.: SBMDS: an interpretable string based malware detection system using SVM ensemble with bagging. J. Comput. Virol. 5(4), 283 (2009)CrossRef Ye, Y., Chen, L., Wang, D., Li, T., Jiang, Q., Zhao, M.: SBMDS: an interpretable string based malware detection system using SVM ensemble with bagging. J. Comput. Virol. 5(4), 283 (2009)CrossRef
23.
Zurück zum Zitat Tipping, M.E., Faul, A.C.: Fast marginal likelihood maximisation for sparse Bayesian models. In: Proceedings of AISTATS 2003, pp. 3–6 (2003) Tipping, M.E., Faul, A.C.: Fast marginal likelihood maximisation for sparse Bayesian models. In: Proceedings of AISTATS 2003, pp. 3–6 (2003)
24.
Zurück zum Zitat Li, T., Dong, H., Yuan, C., Du, Y., Xu, G.: Description of Android malware feature based on Dalvik instructions. J. Comput. Res. Dev. 51(7), 1458–1466 (2014) Li, T., Dong, H., Yuan, C., Du, Y., Xu, G.: Description of Android malware feature based on Dalvik instructions. J. Comput. Res. Dev. 51(7), 1458–1466 (2014)
25.
Zurück zum Zitat Liu, N., Yang, M., Zhang, S.: Detecting applications with malicious behavior in Android device based on GA and SVM. In: Proceedings of ECAE 2018 (2018) Liu, N., Yang, M., Zhang, S.: Detecting applications with malicious behavior in Android device based on GA and SVM. In: Proceedings of ECAE 2018 (2018)
26.
Zurück zum Zitat Arp, D., Spreitzenbarth, M., Hübner, M., Gascon, H., Rieck, K.: DREBIN: effective and explainable detection of Android malware in your pocket. In: NDSS (2014) Arp, D., Spreitzenbarth, M., Hübner, M., Gascon, H., Rieck, K.: DREBIN: effective and explainable detection of Android malware in your pocket. In: NDSS (2014)
Metadaten
Titel
Detection of Android Applications with Malicious Behavior Based on Sparse Bayesian Learning Algorithm
verfasst von
Ning Liu
Min Yang
Hang Zhang
Chen Yang
Yang Zhao
Jianchao Gan
Shibin Zhang
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-00018-9_24