首页> 外文期刊>Engineering Applications of Artificial Intelligence >CANDYMAN: Classifying Android malware families by modelling dynamic traces with Markov chains
【24h】

CANDYMAN: Classifying Android malware families by modelling dynamic traces with Markov chains

机译:CANDYMAN:使用Markov链对动态跟踪进行建模,从而对Android恶意软件家族进行分类

获取原文
获取原文并翻译 | 示例
           

摘要

Malware writers are usually focused on those platforms which are most used among common users, with the aim of attacking as many devices as possible. Due to this reason, Android has been heavily attacked for years. Efforts dedicated to combat Android malware are mainly concentrated on detection, in order to prevent malicious software to be installed in a target device. However, it is equally important to put effort into an automatic classification of the type, or family, of a malware sample, in order to establish which actions are necessary to mitigate the damage caused. In this paper, we present CANDYMAN, a tool that classifies Android malware families by combining dynamic analysis and Markov chains. A dynamic analysis process allows to extract representative information of a malware sample, in form of a sequence of states, while a Markov chain allows to model the transition probabilities between the states of the sequence, which will be used as features in the classification process. The space of features built is used to train classical Machine Learning, including methods for imbalanced learning, and Deep Learning algorithms, over a dataset of malware samples from different families, in order to evaluate the proposed method. Using a collection of 5,560 malware samples grouped into 179 different families (extracted from the Drebin dataset), and once made a selection based on a minimum number of relevant and valid samples, a final set of 4,442 samples grouped into 24 different malware families was used. The experimental results indicate a precision performance of 81.8% over this dataset.
机译:恶意软件编写者通常专注于普通用户中最常用的那些平台,目的是攻击尽可能多的设备。由于这个原因,Android遭受了多年的严重攻击。致力于打击Android恶意软件的工作主要集中在检测上,以防止将恶意软件安装在目标设备中。但是,同样重要的是,要对恶意软件样本的类型或家族进行自动分类,以便确定需要采取哪些措施来减轻造成的损害。在本文中,我们介绍了CANDYMAN,该工具通过结合动态分析和Markov链对Android恶意软件家族进行分类。动态分析过程允许以状态序列的形式提取恶意软件样本的代表性信息,而马尔可夫链则允许对序列状态之间的转移概率进行建模,这将在分类过程中用作特征。构建的功能空间用于对来自不同家族的恶意软件样本数据集进行经典的机器学习训练,包括用于不平衡学习的方法和深度学习算法,以评估所提出的方法。使用将5560个恶意软件样本分为179个不同家族的集合(从Drebin数据集中提取),并根据最小数量的相关有效样本进行选择后,最终使用了4442个样本的最终集合,将其分为24个不同恶意软件家族。实验结果表明,该数据集的精度为81.8%。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号