首页> 美国卫生研究院文献>Sensors (Basel Switzerland) >OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning
【2h】

OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning

机译:操作系统级别函数呼叫图基于Android恶意软件分类使用深度学习

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Due to the openness of an Android system, many Internet of Things (IoT) devices are running the Android system and Android devices have become a common control terminal for IoT devices because of various sensors on them. With the popularity of IoT devices, malware on Android-based IoT devices is also increasing. People’s lives and privacy security are threatened. To reduce such threat, many researchers have proposed new methods to detect Android malware. Currently, most malware detection products on the market are based on malware signatures, which have a fast detection speed and normally a low false alarm rate for known malware families. However, they cannot detect unknown malware and are easily evaded by malware that is confused or packaged. Many new solutions use syntactic features and machine learning techniques to classify Android malware. It has been known that analysis of the Function Call Graph (FCG) can capture behavioral features of malware well. This paper presents a new approach to classifying Android malware based on deep learning and OpCode-level FCG. The FCG is obtained through static analysis of Operation Code (OpCode), and the deep learning model we used is the Long Short-Term Memory (LSTM). We conducted experiments on a dataset with 1796 Android malware samples classified into two categories (obtained from Virusshare and AndroZoo) and 1000 benign Android apps. Our experimental results showed that our proposed approach with an accuracy of outperforms the state-of-the-art methods such as those proposed by Nikola et al. and Hou et al. (IJCAI-18) with the accuracy of and , respectively. The time consumption of our proposed approach is less than the other two methods.
机译:由于Android系统的开放性,许多物联网(IoT)设备运行Android系统,并且Android设备由于它们上的各种传感器而成为IoT设备的公共控制终端。随着物联网设备的普及,基于Android的IoT设备上的恶意软件也在增加。人们的生活和隐私安全受到威胁。为减少此类威胁,许多研究人员提出了检测Android恶意软件的新方法。目前,市场上的大多数恶意软件检测产品都基于恶意软件签名,其具有快速的检测速度,通常是已知恶意软件系列的低误报率。但是,它们无法检测到未知的恶意软件,并且很容易被混淆或包装的恶意软件逃避。许多新解决方案使用句法功能和机器学习技术来分类Android Malware。已知函数调用图(FCG)的分析可以捕获恶意软件的行为特征。本文提出了一种基于深度学习和操作级别FCG对Android恶意软件进行分类的新方法。通过操作代码(OPCODE)的静态分析获得FCG,我们使用的深度学习模型是长短期内存(LSTM)。我们在数据集中进行了实验,其中包含1796个Android恶意软件样本分为两类(从Virusshare和Androzoo获得)和1000良性Android应用程序。我们的实验结果表明,我们所提出的方法,精度优于最先进的方法,例如由Nikola等人提出的方法。和hou等人。 (IJCAI-18)分别为和。我们所提出的方法的时间消耗量小于其他两种方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号