...
首页> 外文期刊>ACM transactions on privacy and security >MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)
【24h】

MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)

机译:Mamadroid:通过建立Markov链条的行为模型(扩展版)来检测Android恶意软件

获取原文
获取原文并翻译 | 示例
           

摘要

As Android has become increasingly popular, so has malware targeting it, thus motivating the research community to propose different detection techniques. However, the constant evolution of the Android ecosystem, and of malware itself, makes it hard to design robust tools that can operate for long periods of time without the need for modifications or costly re-training. Aiming to address this issue, we set to detect malware from a behavioral point of view, modeled as the sequence of abstracted API calls. We introduce MAMADROID, a static-analysis-based system that abstracts app's API calls to their class, package, or family, and builds a model from their sequences obtained from the call graph of an app as Markov chains. This ensures that the model is more resilient to API changes and the features set is of manageable size. We evaluate MAMADROID using a dataset of 8.5K benign and 35.5K malicious apps collected over a period of 6 years, showing that it effectively detects malware (with up to 0.99 F-measure) and keeps its detection capabilities for long periods of time (up to 0.87 F-measure 2 years after training). We also show that MAMADROID remarkably overperforms DROIDAPIMINER, a state-of-the-art detection system that relies on the frequency of (raw) API calls. Aiming to assess whether MAMADROID'S effectiveness mainly stems from the API abstraction or from the sequencing modeling, we also evaluate a variant of it that uses frequency (instead of sequences), of abstracted API calls. We find that it is not as accurate, failing to capture maliciousness when trained on malware samples that include API calls that are equally or more frequently used by benign apps.
机译:随着Android越来越受欢迎,所以具有恶意软件,从而激励研究界提出不同的检测技术。但是,Android生态系统和恶意软件本身的不断发展使得难以设计能够长时间运行的强大工具,而无需修改或昂贵重新培训。旨在解决此问题,我们设置从行为的角度检测恶意软件,以抽象的API调用的序列为模型。我们介绍了Mamadroid,一个基于静态分析的系统,它将应用程序的API调用摘要到他们的类,包或家庭,并从从应用程序的呼叫图所获得的序列构建模型,作为Markov链。这可确保模型更加适用于API变化,并且集合具有可管理的大小。我们使用8.5k良性的数据集和35.5k恶意应用程序在6年内进行评估Mamadroid,表明它有效地检测恶意软件(最多0.99 F-Measure)并保持其长时间的检测能力(UP训练后2年的0.87 F测量)。我们还表明,Mamadroid显着矫正过多的流量,一种依赖于(RAW)API呼叫的频率的最先进的检测系统。旨在评估Mamadroid的效果主要源于API抽象或测序建模,我们还评估了一种使用频率(而不是序列)的变体,抽象的API调用。我们发现它并不准确,无法在恶意软件样本培训时无法捕捉恶意,该样本包括良性应用程序的API调用。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号