期刊文献+

基于深度学习的安卓恶意应用检测 被引量:4

Android malicious application detection based on deep learning
下载PDF
导出
摘要 针对传统的基于特征码的恶意应用检测技术,在应对新的恶意应用产生情况下处理速度上的不足,提出一种基于深度学习的安卓恶意应用检测方法。通过对包含应用静态信息的文件进行反编译处理,提取可表征应用是否为恶意应用的信息,经过数据预处理后生成特征信息输入矩阵,采用多层卷积神经网络进行训练,优化得到较优的参数。实验结果表明,所提方法能有效检测出恶意应用。 Aiming at the traditional signature application-based malicious application detection technology and dealing with the lack of processing speed in the case of new malicious applications,a deep learning-based Android malicious application detection method was proposed.Through decompilation processing of files containing application static information,information that could be used to represent whether the application was a malicious application was extracted from it.After data preprocessing,the feature information input matrix was generated,and the multi-layer convolutional neural network was used for training and optimized to get better parameters.Experimental verification shows that the proposed method can effectively detect malicious applications.
作者 王亚洲 王斌 WANG Ya-zhou;WANG Bin(Beijing Institute of Computer Technology and Applications,Second Academy of China Aerospace Science and Industry Corporation,Beijing 100854,China)
出处 《计算机工程与设计》 北大核心 2020年第10期2752-2757,共6页 Computer Engineering and Design
关键词 安卓恶意应用 静态检测 深度学习 卷积神经网络 反编译 Android malicious application static detection deep learning convolutional neural network decompilation
  • 相关文献

参考文献10

二级参考文献102

  • 1Natani P, Vidyarthi D. An Overview of Detection Techniques for Metamorphic Malware [C]//Proceedings of the International Conference on Intelligent Computing, Networking, and Informatics. Rajput: Springer India, 2013: 637-643.
  • 2Santos I, Brezo F, Ugarte X, et al. Opcode Sequences as Representation of Executables for Data-mining-based Unknown Malware Detection[J]. Information Sciences, 2013, 231(1): 64-82.
  • 3Zhao Z, Wang J, Bai J. Malware Detection Method Based on the Control-flow Construct Feature of Software [J]. lET Information Security, 2014, 8(1): 18-24.
  • 4Bose A, Hu X, Shin K G, et al. Behavioral Detection of Malware on Mobile Handsets [C]//Proeeedings of the 6th International Conference on Mobile Systems, Applications and Services. New York: ACM, 2008: 225-238.
  • 5Schmidt D, Bye R, Schmidt G, et al. Static Analysis of Executables for Collaborative Malware Detection on Android [C]//Proceedings of the IEEE International Conference on Communications. Piscataway: IEEE, 2009: 1-5.
  • 6Shabtai A, Fledel Y, Elovici Y. Automated Static Code Analysis for Classifying Android Applications Using Machine Learning [C]//Proceedings of the IEEE International Conference on Computational Intelligence and Security. Los Alamitos: IEEE, 2010: 329-333.
  • 7Xie L, Zhang X W, Seifert P, et al. PBMDS: a Behavior-based Malware Detection System for Cellphone Devices [C]// Proceedings of the Third ACM Conference on Wireless Network Security. New York: ACM, 2010: 37-48.
  • 8Burguera I, Zurutuza U, Nadjm-Tehrani S. Crowdroid: Behavior-based Malware Detection System for Android [C]// Proceedings of the 1st ACM Workshop: Security and Privacy in Smartphones and Mobile Devices. New York: ACM, 2011: 15-25.
  • 9Google. Android Official Market [DB/OL]. [2014-02-27]. https ://play. google, corn/store.
  • 10Torvalds L. Linux System Call Table [EB/OL] . [2014-02-27] . http://osinside, net/syscall/system_call_table, htm.

共引文献84

同被引文献21

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部