首页> 外文期刊>Future generation computer systems >Static malware detection and attribution in android byte-code through an end-to-end deep system
【24h】

Static malware detection and attribution in android byte-code through an end-to-end deep system

机译:通过端到端深度系统以Android字节码进行静态恶意软件检测和归因

获取原文
获取原文并翻译 | 示例
       

摘要

Android reflects a revolution in handhelds and mobile devices. It is a virtual machine based, an open source mobile platform that powers millions of smartphone and devices and even a larger no. of applications in its ecosystem. Surprisingly in a short lifespan, Android has also seen a colossal expansion in application malware with 99% of the total malware for smartphones being found in the Android ecosystem. Subsequently, quite a few techniques have been proposed in the literature for the analysis and detection of these malicious applications for the Android platform. The increasing and diversified nature of Android malware has immensely attenuated the usefulness of prevailing malware detectors, which leaves Android users susceptible to novel malware. Here in this paper, as a remedy to this problem, we propose an anti-malware system that uses customized learning models, which are sufficiently deep, and are 'End to End deep learning architectures which detect and attribute the Android malware via opcodes extracted from application bytecode'. Our results show that Bidirectional long short-term memory (BiLSTMs) neural networks can be used to detect static behavior of Android malware beating the state-of-the-art models without using handcrafted features. For our experiments in our system, we also choose to work with distinct and independent deep learning models leveraging sequence specialists like recurrent neural networks, Long Short Term Memory networks and its Bidirectional variation as well as those are more usual neural architectures like a network of all connected layers(fully connected), deep convnets, Diabolo network (autoencoders) and generative graphical models like deep belief networks for static malware analysis on Android. To test our system, we have also augmented a bytecode dataset from three open and independently maintained state-of-the-art datasets. Our bytecode dataset, which is on an order of magnitude large, essentially suffice for our experiments. Our results suggests that our proposed system can lead to better design of malware detectors as we report an accuracy of 0.999 and an Fl-score of 0.996 on a large dataset of more than 1.8 million Android applications. (C) 2019 Elsevier B.V. All rights reserved.
机译:Android反映了手持设备和移动设备的一场革命。它是基于虚拟机的开放源代码移动平台,可为数百万个智能手机和设备(甚至更大的智能手机和设备)提供动力。生态系统中的应用程序。出人意料的是,在短生命周期内,Android的应用程序恶意软件也出现了巨大的增长,在Android生态系统中,智能手机总恶意软件的99%都在增长。随后,文献中提出了许多技术来分析和检测这些针对Android平台的恶意应用程序。 Android恶意软件的日益多样化的性质极大地削弱了主流恶意软件检测器的实用性,使Android用户容易受到新型恶意软件的攻击。在本文中,作为对此问题的一种补救措施,我们提出了一种使用自定义学习模型的反恶意软件系统,该学习模型足够深入,并且是“端到端深度学习体系结构,可通过从中提取的操作码来检测并归因于Android恶意软件应用字节码”。我们的结果表明,双向长短期记忆(BiLSTM)神经网络可用于检测Android恶意软件的静态行为,而无需使用手工功能即可击败最先进的模型。对于我们系统中的实验,我们还选择使用独特的独立深度学习模型,以利用序列专家(例如递归神经网络,长期短期记忆网络及其双向变异)以及那些更常见的神经体系结构(例如所有网络)连接层(完全连接),深层convnet,Diabolo网络(自动编码器)和生成图形模型(例如深度信念网络),用于在Android上进行静态恶意软件分析。为了测试我们的系统,我们还从三个开放且独立维护的最新数据集中扩充了字节码数据集。我们的字节码数据集大约一个数量级,足以满足我们的实验要求。我们的结果表明,我们提出的系统可以更好地设计恶意软件检测器,因为我们在超过180万个Android应用程序的大型数据集上报告的准确性为0.999,Fl分数为0.996。 (C)2019 Elsevier B.V.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号