期刊文献+

基于机器学习的Android恶意软件检测实验 被引量:5

Android malware detection experiment based on machine learning
下载PDF
导出
摘要 针对传统Android恶意软件检测技术准确率不足的问题,该文设计并用实验验证了一种基于机器学习的Android恶意软件检测方法。首先提取Android应用的一些关键静态特征,生成对应的特征向量,然后采用机器学习算法构建并训练模型,最后对待测Android应用软件进行分类检测。实验结果表明,在使用相同数据集的情况下,支持向量机(SVM)算法取得了96.4%的检测率,略高于逻辑回归、朴素贝叶斯、决策树算法。通过实验,不仅使学生对Android应用软件有了更清晰的认识,还提升了学生用机器学习方法分析和解决实际问题的能力。 In view of the problem that the detection accuracy of traditional Android malware detection technology is insufficient,a machine learning based Android malware detection method is designed and tested.Firstly,the key static features of Android applications are extracted,and the corresponding feature vectors are generated.Then,the model is trained by machine learning algorithm.Finally,the Android applications are classified and detected.Experimental results show that with the same data set,the detection rate of SVM is 96.4%,which is slightly higher than the logistic regression,naive Bayes and decision tree algorithm.Through the experiment,it not only enables students to get a clearer understanding of Android application software,but also improves their ability to analyze and solve practical problems with machine learning methods.
作者 陈镭 杨章静 黄璞 CHEN Lei;YANG Zhangjing;HUANG Pu(Experimental Center,Nanjing Audit University,Nanjing 211815,China;School of Information Engineering,Nanjing Audit University,Nanjing 211815,China;State Key Laboratory for Novel Software Technology,Nanjing University,Nanjing 210232,China)
出处 《实验技术与管理》 CAS 北大核心 2020年第12期94-97,共4页 Experimental Technology and Management
基金 国家自然科学基金(U1831127) 物联网产业化与智能生产协同创新中心(闽江学院)基金(IIC1705) 南京审计大学高教研究课题(2020JG049)。
关键词 ANDROID应用 恶意软件 机器学习 WEKA平台 Android application malware machine learning Weka platform
  • 相关文献

参考文献13

二级参考文献206

  • 1Desnos A. Android: Static analysis using similarity distance [C] //Proc of the 45th Hawaii Int Conf on System Sciences (HICSS). Los Alamitos, CA~ IEEE Computer Society, 2012:5394-5403.
  • 2Christodorescu M, Jha S, Seshia S A, et al. Semantics- aware malware detection [C] //Proc of the 2005 IEEE Syrup on Security and Privacy (Oakland'05). Los Alamitos, CA: IEEE Computer Society, 2005:32-46.
  • 3Dagon D, Martin T, Starner T. Mobile phones as computing devices: The viruses are coming! [J]. IEEE Pervasive Computing, 2004, 3(4): 11-15.
  • 4Leavitt N. Mobile phones: The next frontier for hackers? [J]. Computer, 2005, 38(4): 20-23.
  • 5Cheng J, Wong S H, Yang H, et al. Smartsiren: Virus detection and alert for smartphones [C] //Proc of the 5th Int Conf on Mobile Systems, Applications and Services. New York: ACM, 2007, 258-271.
  • 6Shabtai A, Fledel Y, Kanonov U, et al. Google Android: A state-of-the-art review of security mechanisms [OL]. [2012- 12-05]. http://arxiv, org/ftp/arxiv/papers/0912/0912. 5101. pdf.
  • 7Sanz B, Santos I, Laorden C, et al. PUMA: Permission usage to detect malware in android [C] //Proc of the 5th Int Conf on Computational Intelligence in Security for Information Systems (CISIS'02). Berlin: Springer, 2013: 289-298.
  • 8Schmidl A D, Bye R, Schmidt H G, et al. Static analysis of executables for collaborative malware detection on android [C] //Proc of the 8th IEEE Int Conf on Communications (ICC'09). Piscataway, NJ: IEEE, 2009:1-5.
  • 9Desnos A. Androguard: Reverse engineering, malware and goodware analysis of Android applications : and more (ninja!)[CP/OL]. [2013-03-26]. http://code, google, com/ p/androguard/.
  • 10Cilibrasi R, Vitanyi P M B. Clustering by compression [J]. IEEETrans on Information Theory, 2005, 51 (4): 1523- 1545.

共引文献387

同被引文献50

引证文献5

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部