期刊文献+

一种基于改进的关联规则挖掘算法的Android恶意软件检测方法 被引量:1

One of Android Malware Detection Method Based on Improved Permission Association Rules Mining Algorithm
下载PDF
导出
摘要 针对Android平台恶意软件的检测需求的上升和现有的关联规则挖掘算法的效率较低,不能直接用于恶意软件的检测的问题,论文在改进的关联规则挖掘算法(Eclat)的基础之上,设计了一种挖掘权限之间关联性的算法(AEclat),该算法在49个恶意软件家族之上进行权限频繁模式挖掘,通过得到极大频繁项集,进一步构造权限关系特征库,依此来对恶意软件进行检测。实验分析表明论文提出的方法对恶意软件有较高的识别率和较小的误报率,可以有效增强Android系统的安全性。 mTo solve the problem of rising demand for malware detection on Android platforms and the existing association rulemining algorithms are inefficient and they cannot be used directly in the detection of malicious software,an algorithm AEclat is de-signed to dig out permissions association rules which are based on a improved permission association rules data mining algorithmEclat in our paper. This algorithm is used to test 49 malicious application families,then though the maximal frequent item set whichthe permissions association dataset is built to detect malware. The experimental results show that the proposed method has a high rec-ognition rate and a low false alarm rate on malware detection,it can effectively enhance the security of Android system.
作者 严喆 朱保平 YAN Zhe;ZHU Baoping(School of Computer Science and Engineering,Nanjing University of Science and Technology,Nanjing 210094)
出处 《计算机与数字工程》 2018年第6期1167-1172,共6页 Computer & Digital Engineering
关键词 ANDROID 关联规则 恶意软件检测 数据挖掘 权限组合 Android association rules malware detection data mining permission combination
  • 相关文献

参考文献1

二级参考文献12

  • 1戚湧,胡俊,於东军.基于自组织映射与概率神经网络的增量式学习算法[J].南京理工大学学报,2013,37(1):1-6. 被引量:7
  • 2Anastasia S,Dennis G.Review of the mobile malware detection approaches[C]//Proceedings of the 23rd International Conference on Parallel,Distributed and Network-Based Processing.Washington,USA:IEEE Computer Society,2015:600-603.
  • 3Islam R,Tian R,Batten L M,et al.Review:classification of malware based on integrated static and dynamic features[J].Journal of Network and Computer Applications,2013,36(2):646-656.
  • 4Mas’Ud M Z,Sahib S,Abdollah M F,et al.Analysis of features selection and machine learning classifier in Android malware detection[C]//Proceedings of IEEE International Conference on Information Science and Applications.Washington,USA:IEEE Computer Society,2014:1-5.
  • 5Zhou Yajin,Wang Zhi,Zhou Wu,et al.Hey,you,get off of my market:detecting malicious Apps in official and alternative Android markets[C]//Proceedings of the 19th Annual Network & Distributed System Security Symposium.Washington,USA:Internet Society,2012:123-129.
  • 6Zhang Yuan,Yang Min,Yang Zhemin,et al.Permission use analysis for vetting undesirable behaviors in Android Apps[J].IEEE Transactions on Information Forensics and Security,2014,9(11):1828-1842.
  • 7Pandita R,Xiao X,Yang W,et al.WHYPER:towards automating risk assessment of mobile applications[C]//Proceedings of the 22nd USENIX Security Symposium.Berkeley,USA:USENIX,2013:89-97.
  • 8Salehi Z,Ghiasi M,Sami A.A miner for malware detection based on API function calls and their arguments[C]//Proceedings of the 16th CSI International Symposium on Artificial Intelligence and Signal Processing.Washington,USA:IEEE Computer Society,2012:563-568.
  • 9Yerima S Y,Sezer S,Muttik I.High accuracy Android malware detection using ensemble learning[J].IET Information Security,2015,9(6):313-320.
  • 10杨欢,张玉清,胡予濮,刘奇旭.基于多类特征的Android应用恶意行为检测系统[J].计算机学报,2014,37(1):15-27. 被引量:89

共引文献7

同被引文献7

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部