首页> 外文期刊>Journal of information security and applications >Android botnet detection using machine learning models based on a comprehensive static analysis approach
【24h】

Android botnet detection using machine learning models based on a comprehensive static analysis approach

机译:基于综合静态分析方法,使用机器学习模型的Android僵尸网络检测

获取原文
获取原文并翻译 | 示例
           

摘要

Today, Android stands out amongst the most well-known and far reaching smartphones' operating systems. It has millions of applications that are distributed at either accredited or informal stores. Botnet applications are classified as malwares that can be distributed by utilizing these stores and downloaded by the unfortunate users on their smartphones. This work investigates Android botnets using static analysis to extract possible features from the applications source code after being reverse engineered. The features are then used to develop effective machine learning models to detect such malicious applications. Additionally, the study proposes a new set of features related to accessing resources on the target mobile. The features are extracted from 1928 Android botnet applications (ISCX dataset) and 2224 of Android benign applications (downloaded and scanned by special tools developed as part of this work). The extracted features are categorized into six groups of features in addition to a group that contains all the extracted features. Each group of features undergoes training and testing processes using four popular ML classifiers (i.e. Random Forest, Multi-Layer Perceptron neural networks, Decision trees, and Naive Bayes). After comparing the results and performing features importance analysis, it can be noted that the URL set of features play the key role in the Android botnet detection problem and the Random Forest classifier obtains the best results based on all sets of features.
机译:如今,Android脱颖而出,是最著名和最遥远的智能手机操作系统。它有数百万个申请,这些申请分布在认可或非正式商店。僵尸网络应用程序被归类为可以通过使用这些商店分发并由不幸用户在其智能手机上下载的恶性应用程序。这项工作使用静态分析调查了Android僵尸网络,以在经过逆向工程后从应用程序源代码中提取可能的功能。然后,这些功能用于开发有效的机器学习模型以检测这种恶意应用程序。此外,该研究提出了一套与访问目标移动设备上资源有关的新功能。这些功能是从1928年提取的Android BotNet应用程序(ISCX数据集)和2224个Android良性应用程序(作为本工作的一部分开发的专用工具下载和扫描)。除了包含所有提取功能的组之外,提取的功能除了六组功能。每组特征都使用四个流行的ML分类器(即随机森林,多层感知器神经网络,决策树和幼稚的贝叶斯)进行培训和测试过程。在比较结果和执行功能重要性分析之后,可以注意到,URL功能集在Android僵尸网络检测问题中起关键作用,并且随机森林分类器根据所有特征集获得了最佳结果。

著录项

相似文献

  • 外文文献
  • 中文文献
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号