Skip to main content

2014 | OriginalPaper | Buchkapitel

7. Towards Neural Network Based Malware Detection on Android Mobile Devices

verfasst von : Wei Yu, Linqiang Ge, Guobin Xu, Xinwen Fu

Erschienen in: Cybersecurity Systems for Human Cognition Augmentation

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Due to the exponential increase in the use of smart mobile devices, malware threats on those devices have been growing and posing security risks. To address this critical issue, we developed an Artificial Neural Network (ANN)-based malware detection system to detect unknown malware. In our system, we consider both permissions requested by applications and system calls associated with the execution of applications to distinguish between benign applications and malware. We used ANN, a representative machine learning technique, to understand the anomaly behavior of malware by learning the characteristic permissions and system calls used by applications. We then used the trained ANN to detect malware. Using real-world malware and benign applications, we conducted experiments on Android devices and evaluated the effectiveness of our developed system.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat What is Android? http://android.pk/android.html. What is Android? http://​android.​pk/​android.​html.​
3.
Zurück zum Zitat A. Nere, A. Hashmi, M. Lipasti, and G. Tononi: Bridging the Semantic Gap: Emulating Biological Neuronal Behaviors with Simple Digital Neurons. In Proceedings of IEEE 19th International Symposium on High Perfor- mance Computer Architecture (HPCA), (2013). A. Nere, A. Hashmi, M. Lipasti, and G. Tononi: Bridging the Semantic Gap: Emulating Biological Neuronal Behaviors with Simple Digital Neurons. In Proceedings of IEEE 19th International Symposium on High Perfor- mance Computer Architecture (HPCA), (2013).
4.
Zurück zum Zitat D. J. Montana and L. Davis: Training Feedforward Neural Networks Using Ge- netic. In Proceedings of International Joint Conference on Artificial Intelligence Algorithms, (1989). D. J. Montana and L. Davis: Training Feedforward Neural Networks Using Ge- netic. In Proceedings of International Joint Conference on Artificial Intelligence Algorithms, (1989).
5.
Zurück zum Zitat X. Yu, M. O. Efe, and O. Kaynak: A General Backpropagation Algorithm for Feedforward Neural Networks Learning. In IEEE Transactions on Neural Net- works, vol. 13, pp. 251-254 (2002).CrossRef X. Yu, M. O. Efe, and O. Kaynak: A General Backpropagation Algorithm for Feedforward Neural Networks Learning. In IEEE Transactions on Neural Net- works, vol. 13, pp. 251-254 (2002).CrossRef
6.
Zurück zum Zitat G. Arulampalam and A. Bouzerdoum: A Generalized Feedforward Neural Network Architecture for Classification and Regression. In Journal of Neural Networks, vol. 16, pp. 561-568 (2003).CrossRef G. Arulampalam and A. Bouzerdoum: A Generalized Feedforward Neural Network Architecture for Classification and Regression. In Journal of Neural Networks, vol. 16, pp. 561-568 (2003).CrossRef
7.
Zurück zum Zitat J. Y. F. Yam and T. W. S. Chow: A Weight Initialization Method for Improving Training Speed in Feedforward Neural Network. In Neurocomputing, vol. 30, pp. 219-232 (2000).CrossRef J. Y. F. Yam and T. W. S. Chow: A Weight Initialization Method for Improving Training Speed in Feedforward Neural Network. In Neurocomputing, vol. 30, pp. 219-232 (2000).CrossRef
8.
Zurück zum Zitat S. Kak: On Training Feedforward Neural Networks. In Pramana-Journal of Physics, vol. 40, pp. 35-42 (1993).CrossRef S. Kak: On Training Feedforward Neural Networks. In Pramana-Journal of Physics, vol. 40, pp. 35-42 (1993).CrossRef
9.
Zurück zum Zitat A. D. Schmidt, R. Bye, H. G. Schmidt, J. H. Clausen, O. Kiraz, K. Yuksel, S. A. Camtepe, and S. Albayrak: Static Analysis of Executables for Collaborative Malware Detection on Android. In Proceedings of the IEEE International Conference on Communications (ICC), (2009). A. D. Schmidt, R. Bye, H. G. Schmidt, J. H. Clausen, O. Kiraz, K. Yuksel, S. A. Camtepe, and S. Albayrak: Static Analysis of Executables for Collaborative Malware Detection on Android. In Proceedings of the IEEE International Conference on Communications (ICC), (2009).
10.
Zurück zum Zitat M. Grace, Y. Zhou, Z. Wang, and X. Jiang: Systematic Detection of Capability Leaks in Stock Android Smartphones. In Proceedings of the 19th Annual Symposium on Network and Distributed System Security (NDSS), (2012). M. Grace, Y. Zhou, Z. Wang, and X. Jiang: Systematic Detection of Capability Leaks in Stock Android Smartphones. In Proceedings of the 19th Annual Symposium on Network and Distributed System Security (NDSS), (2012).
11.
Zurück zum Zitat I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani: Crowdroid: Behavior-based Mal- ware Detection System for Android. In Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, (2011). I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani: Crowdroid: Behavior-based Mal- ware Detection System for Android. In Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, (2011).
12.
Zurück zum Zitat A. Bose, X. Hu, K. G. Shin, and T. Park: Behavioral Detection of Malware on Mobile Handsets. In Proceedings of the 6th ACM International Conference on Mobile Systems, Applications, and Services, (2008). A. Bose, X. Hu, K. G. Shin, and T. Park: Behavioral Detection of Malware on Mobile Handsets. In Proceedings of the 6th ACM International Conference on Mobile Systems, Applications, and Services, (2008).
13.
Zurück zum Zitat A. S. Shamili, C. Bauckhage, and T. Alpcan: Malware Detection on Mobile Devices using Distributed Machine Learning. In Proceedings of 20th IEEE International Conference on Pattern Recognition (ICPR), (2010). A. S. Shamili, C. Bauckhage, and T. Alpcan: Malware Detection on Mobile Devices using Distributed Machine Learning. In Proceedings of 20th IEEE International Conference on Pattern Recognition (ICPR), (2010).
14.
Zurück zum Zitat D. Venugopal and G. Hu: Efficient Signature based Malware Detection on Mobile Devices. In Journal of Mobile Information Systems, vol. 4, no. 1, pp. 33- 49 (2008). D. Venugopal and G. Hu: Efficient Signature based Malware Detection on Mobile Devices. In Journal of Mobile Information Systems, vol. 4, no. 1, pp. 33- 49 (2008).
15.
Zurück zum Zitat A. D. Schmidt, R. Bye, H. G. Schmidt, J. Clausen, O. Kiraz, K. A. Yuksel, S. A. Camtepe, and S. Albayrak: Static Analysis of Executables for Collaborative Malware Detection on Android. In Proceedings of IEEE International Conference on Communications (ICC), (2009). A. D. Schmidt, R. Bye, H. G. Schmidt, J. Clausen, O. Kiraz, K. A. Yuksel, S. A. Camtepe, and S. Albayrak: Static Analysis of Executables for Collaborative Malware Detection on Android. In Proceedings of IEEE International Conference on Communications (ICC), (2009).
16.
Zurück zum Zitat A. Shabtai: Malware Detection on Mobile Devices. In Proceedings of the 11th IEEE International Conference on Mobile Data Management (MDM), pp. (2010). A. Shabtai: Malware Detection on Mobile Devices. In Proceedings of the 11th IEEE International Conference on Mobile Data Management (MDM), pp. (2010).
17.
Zurück zum Zitat A. Dinaburg, P. Royal, M. Sharif, and W. Lee: Ether: Malware Analysis via Hardware Virtualization Extensions. In Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS), (2008). A. Dinaburg, P. Royal, M. Sharif, and W. Lee: Ether: Malware Analysis via Hardware Virtualization Extensions. In Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS), (2008).
18.
Zurück zum Zitat Z. Aung and W. Zaw: Permission-Based Android Malware Detection. In International Journal of Scientific and Technology Research, vol. 2 (2013). Z. Aung and W. Zaw: Permission-Based Android Malware Detection. In International Journal of Scientific and Technology Research, vol. 2 (2013).
19.
Zurück zum Zitat D. Barrera, H. G. Kayacik, P. C. van Oorschot, and A. Somayaji: A Methodology for Empirical Analysis of Permission-based Security Models and Its Application to Android. In Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS), (2010). D. Barrera, H. G. Kayacik, P. C. van Oorschot, and A. Somayaji: A Methodology for Empirical Analysis of Permission-based Security Models and Its Application to Android. In Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS), (2010).
20.
Zurück zum Zitat C.-Y. Huang, Y.-T. Tsai, and C.-H. Hsu: Performance Evaluation on Permission-based Detection for Android Malware. In Springer Berlin Heidelberg, pp. 111-120 (2013). C.-Y. Huang, Y.-T. Tsai, and C.-H. Hsu: Performance Evaluation on Permission-based Detection for Android Malware. In Springer Berlin Heidelberg, pp. 111-120 (2013).
21.
Zurück zum Zitat J. Cannady: Artificial Neural Networks for Misuse Detection. In Proceedings of National Information Systems Security Conference, (1998). J. Cannady: Artificial Neural Networks for Misuse Detection. In Proceedings of National Information Systems Security Conference, (1998).
22.
Zurück zum Zitat S. Mukkamala, G. Janoski, and A. Sung: Intrusion Detection Using Neural Networks and Support Vector Machines. In Proceedings of IEEE International Joint Conference on Neural Networks, (2002). S. Mukkamala, G. Janoski, and A. Sung: Intrusion Detection Using Neural Networks and Support Vector Machines. In Proceedings of IEEE International Joint Conference on Neural Networks, (2002).
23.
Zurück zum Zitat O. Linda, T. Vollmer, and M. Manic: Neural Network based Intrusion Detection System for Critical Infrastructures. In Proceedings of IEEE International Joint Conference on Neural Networks, (2009). O. Linda, T. Vollmer, and M. Manic: Neural Network based Intrusion Detection System for Critical Infrastructures. In Proceedings of IEEE International Joint Conference on Neural Networks, (2009).
24.
Zurück zum Zitat V. Golovko, S. Bezobrazov, P. Kachurka, and L. Vaitsekhovich: Neural Network and Artificial Immune Systems for Malware and Network Intrusion Detection. In Advances in Machine Learning II. Springer, pp. 485-513 (2010). V. Golovko, S. Bezobrazov, P. Kachurka, and L. Vaitsekhovich: Neural Network and Artificial Immune Systems for Malware and Network Intrusion Detection. In Advances in Machine Learning II. Springer, pp. 485-513 (2010).
Metadaten
Titel
Towards Neural Network Based Malware Detection on Android Mobile Devices
verfasst von
Wei Yu
Linqiang Ge
Guobin Xu
Xinwen Fu
Copyright-Jahr
2014
DOI
https://doi.org/10.1007/978-3-319-10374-7_7