首页> 外文期刊>Computers & Security >Leveraging ontologies and machine-learning techniques for malware analysis into Android permissions ecosystems
【24h】

Leveraging ontologies and machine-learning techniques for malware analysis into Android permissions ecosystems

机译:利用本体和机器学习技术对Android权限生态系统进行恶意软件分析

获取原文
获取原文并翻译 | 示例
           

摘要

Smartphones form a complex application ecosystem with a myriad of components, properties, and interfaces that produce an intricate relationship network. Given the intrinsic complexity of this system, we hereby propose two main contributions. First, we devise a methodology to systematically determine and analyze the complex relationship network among components, properties, and interfaces associated with the permission mechanism in Android ecosystems. Second, we investigate whether it is possible to identify characteristics shared by malware samples at this high level of abstraction that could be leveraged to unveil their presence. We propose an ontology-based framework to model the relationships between application and system elements, together with a machine-learning approach to analyze the complex network that arises therefrom. We represent the ontological model for the considered Android ecosystem with 4570 apps through a graph with some 55,000 nodes and 120,000 edges. Experiments have shown that a classifier operating on top of this complex representation can achieve an accuracy of 88% and precision of 91% and is capable of identifying and determining 24 features that correspond to 70 important graph nodes related to malware activity, which is a remarkable feat for security. (C) 2018 Elsevier Ltd. All rights reserved.
机译:智能手机形成了一个复杂的应用程序生态系统,其中包含无数的组件,属性和接口,这些组件,属性和接口产生了复杂的关系网络。考虑到该系统的内在复杂性,我们在此提出两个主要贡献。首先,我们设计一种方法来系统地确定和分析与Android生态系统中的许可机制关联的组​​件,属性和接口之间的复杂关系网络。其次,我们调查是否有可能在这种高抽象水平上识别恶意软件样本所共享的特征,以利用这些特征来揭示它们的存在。我们提出了一种基于本体的框架来对应用程序和系统元素之间的关系进行建模,并提出一种机器学习方法来分析由此产生的复杂网络。我们通过一个带有约55,000个节点和120,000条边的图形来代表4570个应用程序,为所考虑的Android生态系统提供本体模型。实验表明,在这种复杂表示形式之上运行的分类器可以达到88%的精度和91%的精度,并且能够识别和确定与70个与恶意软件活动相关的重要图节点相对应的24个特征,这是一个了不起的成就安全的壮举。 (C)2018 Elsevier Ltd.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号