期刊文献+

结合应用接口可达性特征的Android恶意软件检测 被引量:1

Android malware detection based on accessibility features of application interface
下载PDF
导出
摘要 针对Android恶意软件检测,现有的研究多数提出了多种类特征结合机器学习来提高恶意程序检测中检测率,却少有考虑程序内应用接口调用之间的关联和程序调用图中的边信息。设计了基于应用接口可达性特征的Android恶意软件检测的方法,该方法基于恶意行为提取了应用接口的可达性特征,有效地使特征集包含边信息。在VirusShare所收集的2018年的恶意程序集中的1 151个恶意程序与来自Google Player的1 021个良性程序上进行了实验,结果为采用随机森林方法得到的模型相比其他4种方法更有效实现恶意程序的检测,并且模型整体的准确率达到了98.90%。结果表明应用接口可达性特征使得模型的召回率和精度均有所提高,并且相比实验中的其他特征更为重要。 For Android malware detection,most of research proposed multi-type features combined with machine learning to improve the detection rate of malware detection,but rarely considered association between application interface and edge information in call graph.Designs a method of Android malware detection based on accessibility feature of application interface.This method extracts accessibility features of application interface based on malicious behaviors,effectively makes feature set contain edge information.Experiments were conducted on 1151 malware collected by VirusShare in 2018and 1021benign programs from Google Player.Experiments show that random forest is more effective than other four methods in malware detection,and accuracy of model reaches 98.90%.Results show that accessibility features improved recall rate and precision of the model,and is more important than other features in the experiment.
作者 金泽宇 朱正伟 Jin Zeyu;Zhu Zhengwei(School of Computer Science and Artificial Intelligence,Changzhou University,Changzhou 213000,China;School of Microelectronics and Control Engineering,Changzhou University,Changzhou 213000,China)
出处 《电子测量技术》 北大核心 2021年第9期48-55,共8页 Electronic Measurement Technology
关键词 恶意程序检测 机器学习 边信息 恶意行为 可达性特征 malware detection machine learning edge information malicious behavior accessibility feature
  • 相关文献

参考文献5

二级参考文献24

  • 1Wang W,,Zhang P T,Tan Y,et al.A hierarchical artificial immune model for virus detection. Proceedings of International Conference on Computational Intelligence and Security . 2009
  • 2HENCHIRI O,JAPKOWICZ N.A feature selection and evaluation scheme for computer virus detection. Proceedings of the Sixth International Conference on Data Mining(ICDM’06) . 2006
  • 3Tabish S M,Shafiq M Z,Farooq M.Malware detection using statistical analysis of byte-level file content. CSI- KDD’09 . 2009
  • 4Ye Y F,Jiang Q S,Zhuang W W.Associative classification and post-processing techniques used for malware detection. 2nd International Conference on Anti-counterfeiting, Security and Identification . 2008
  • 5YE Yan-fang.IMDS intelligent malware detection system. The13th International Conference on Knowledge Discovery and Data Mining . 2007
  • 6Deng P S,Wang J H,Shieh W G,et al.Intelligent Automatic Malicious Code Signatures Extraction. IEEE37th Annual2003International Carnahan Conference on Security Technology . 2003
  • 7Karnik A,Goswami S,Guha P.Detecting obfuscated viruses using cosine similarity analysis. Proceedings of the First Asia International Conference on Modeling & Simulation . 2007
  • 8Lee H,Ki m W,Hong M.Artificial i mmune systemagainstviral attack. Proceedings of the ICCS 2004 . 2004
  • 9Edge K S,Lamont G B,Raines R A.A retrovirus inspired algorithm for virus detection & optimization. Proceedings of the 8th Annual Conference on Genetic and Evolutionary Computation . 2006
  • 10Li Z,Liang Y W,Wu Z J, et al.Immunity based virus detection with process call arguments and user feedback. Bio-Inspired Models of Network, Information and Computing Systems . 2007

共引文献43

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部