期刊文献+

基于N-gram的Android恶意检测 被引量:7

Android Malware Detection Based on N-gram
下载PDF
导出
摘要 随着Android系统的广泛应用,Android平台下的恶意应用层出不穷,并且恶意应用躲避现有检测工具的手段也越来越复杂,亟需更有效的检测技术来分析恶意行为。文中提出并设计了一种基于N-gram的静态恶意检测模型,该模型通过逆向手段反编译Android APK文件,利用N-gram技术在字节码上提取特征,以此避免传统检测中专家知识的依赖。同时,该模型使用深度置信网络,能够快速而准确地学习训练。通过对1267个恶意样本和1200个善意样本进行测试,结果显示模型整体的检测准确率最高可以达到98.34%。实验进一步比较了该模型和其他算法的检测结果,并对比了相关工作的检测效果,结果表明该模型有更好的准确率和鲁棒性。 With the widespread use of Android operating system,malicious applications are constantly emerging on the Android platform,meanwhile,the means by which malicious applications evade existing detection tools are becoming increasingly complicated.In order to effectively analyze malicious behavior,more efficient detection technology is required.This paper presented and designed a static malicious detection model based on N-gram technology.The model decompiles Android APK files by reversing engineering and uses N-gram technology to extract features from bytecodes.In this way,the model avoids dependence on expert knowledge in traditional detection.At the same time,the model combines with deep belief network,which allows it to rapidly and accurately train and detect application samples.1 267 malicious samples and 1 200 benign samples were tested.The results show that the overall accuracy is up to 98.34%.Further more,the results of the model were compared with those of other machine learning algorithms,and the detection results of the related work were also compared.The results show that the model has better accuracy and robustness.
作者 章宗美 桂盛霖 任飞 ZHANG Zong-mei;GUI Sheng-lin;REN Fei(School of Computer Science and Engineering,University of Electronic Science and Technology of China,Chengdu 611731,China;The 30th Institute of China Electronics Technology Group Corporation,Chengdu 610041,China)
出处 《计算机科学》 CSCD 北大核心 2019年第2期145-151,共7页 Computer Science
基金 国家自然科学基金(61401067)资助
关键词 ANDROID应用 恶意检测 N-GRAM 深度置信网络 静态检测 Android application Malware detection N-gram Deep belief network Static detection
  • 相关文献

参考文献5

二级参考文献168

  • 1Desnos A. Android: Static analysis using similarity distance [C] //Proc of the 45th Hawaii Int Conf on System Sciences (HICSS). Los Alamitos, CA~ IEEE Computer Society, 2012:5394-5403.
  • 2Christodorescu M, Jha S, Seshia S A, et al. Semantics- aware malware detection [C] //Proc of the 2005 IEEE Syrup on Security and Privacy (Oakland'05). Los Alamitos, CA: IEEE Computer Society, 2005:32-46.
  • 3Dagon D, Martin T, Starner T. Mobile phones as computing devices: The viruses are coming! [J]. IEEE Pervasive Computing, 2004, 3(4): 11-15.
  • 4Leavitt N. Mobile phones: The next frontier for hackers? [J]. Computer, 2005, 38(4): 20-23.
  • 5Cheng J, Wong S H, Yang H, et al. Smartsiren: Virus detection and alert for smartphones [C] //Proc of the 5th Int Conf on Mobile Systems, Applications and Services. New York: ACM, 2007, 258-271.
  • 6Shabtai A, Fledel Y, Kanonov U, et al. Google Android: A state-of-the-art review of security mechanisms [OL]. [2012- 12-05]. http://arxiv, org/ftp/arxiv/papers/0912/0912. 5101. pdf.
  • 7Sanz B, Santos I, Laorden C, et al. PUMA: Permission usage to detect malware in android [C] //Proc of the 5th Int Conf on Computational Intelligence in Security for Information Systems (CISIS'02). Berlin: Springer, 2013: 289-298.
  • 8Schmidl A D, Bye R, Schmidt H G, et al. Static analysis of executables for collaborative malware detection on android [C] //Proc of the 8th IEEE Int Conf on Communications (ICC'09). Piscataway, NJ: IEEE, 2009:1-5.
  • 9Desnos A. Androguard: Reverse engineering, malware and goodware analysis of Android applications : and more (ninja!)[CP/OL]. [2013-03-26]. http://code, google, com/ p/androguard/.
  • 10Cilibrasi R, Vitanyi P M B. Clustering by compression [J]. IEEETrans on Information Theory, 2005, 51 (4): 1523- 1545.

共引文献210

同被引文献72

引证文献7

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部