期刊文献+

基于多维特征的Android恶意应用检测系统 被引量:3

Android Malicious Application Detection System Based on Multidimensional Feature
下载PDF
导出
摘要 为了提高检测效率和降低系统开销,提出了使用多个级别的不同分类器用于平衡精确度和系统开销的检测机制.采用操作码等多个独立的数据源作为机器学习的训练集,仅在级别1无法提供可靠的检测时,将级别2作为最终检测结果.并在关注申请权限的同时,研究运行时权限之间的关联性,使用n-gram处理操作码序列.最后,通过实验验证了该方法能够在降低开销的同时保证方法的有效性,因此,提出的方法可以有效地用于未知应用的恶意代码检测. In order to improve the detection efficiency and reduce the system overhead a detection mechanism using multiple levels of different classifiers for balancing accuracy and system overhead is proposed. A number of independent data sources? such as operation codes? are used as machinelearning training sets. Only when level one fails to provide reliable detection,level two will beused as the final detection result. While paying attention to the application permissions,we studythe association between the runtime permissions by using n-gram to process the opcode sequences. Finally, experiments show that the proposed method can reduce the overhead and ensure theeffectiveness of the method. Therefore,the proposed method can be used effectively for malicious code detection in unknown applications.
作者 陈泽峰 方勇 刘亮 左政 李抒霞 Chen Zefeng;Fang Yong;Liu Liang;Zuo Zheng;Li Shuxia(Information Security Institute , Sichuan University , Chengdu 610065;College of Cyber security , Sichuan University,Chengdu 610065)
出处 《信息安全研究》 2018年第2期133-139,共7页 Journal of Information Security Research
关键词 ANDROID系统 恶意代码检测 随机森林 操作码 机器学习 数据挖掘 Android malicious code detection random forest opcode machine learning datamining
  • 相关文献

参考文献5

二级参考文献44

  • 1Ritchie 0 M,Thompson K. The UNIX time-sharing system [ J ]. BellSystem Technical Journal, 1978,57(6): 1905-1929.
  • 2Qiu Lili, Zhang Yin, Wang Feng, et al. Trusted computer systemevaluation criteria [ S ]. [ S. 1. ] : National Computer Security Center,1985.
  • 3Barrera D, Kayacik H G, Van Oorschot P C, ei al. A methodologyfor empirical analysis of permission-based security models and its ap-plication to Android[ C ] //Proc of the 17th ACM Conference on Com-puter and Communications Security. New York : ACM Press, 2010 :73-84.
  • 4Felt A P, Greenwood K, Wagner D. The effectiveness of install-timepermission systems for third-party applications, UCB/EECS-2010-143[R]. Berkeley: University of California, 2010.
  • 5Felt A P, Ha E, Egelman S, et al. Android permissions: user atten-tion, comprehension, and behavior[ C ] //Proc of the 8th Symposiumon Usable Privacy and Security. New York : ACM Press, 2012 : 3.
  • 6Nauman M, Khan S, Zhang X. Apex: extending Android permissionmodel and enforcement with user-defined runtime constraints [ C ]//Proc of the 5th ACM Symposium on Information, Computer and Com-munications Security. New York:ACM Press, 2010: 328-332.
  • 7Conti M,Nguyen V T N, Crispo B. CRePE: context-related policyenforcement for Android [ M ] //Information Security. Berlin : Sprin-ger, 2011: 331-345.
  • 8Ongtang M,McLaughlin S,Enck W,et al. Semantically rich appli-cation-centric security in Android [ J ]. Security 3nd Communica-tion Networks, 2012, 5(6) : 658-673.
  • 9Davi L, Dmitrienko A, Sadeghi A R, ef al. Privilege escalationattacks on Android [ M ]//Information Security. Berlin : Springer,2011: 346-360.
  • 10Dietz M, Shekhar S, Pisetsky Y,et al. QUIRE : lightweight prove-nance for smart phone operating systems [ C ] //Proc of the 20 th USE-NIX Security Symposium. 2011.

共引文献48

同被引文献10

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部