Identifying Android malware using network-based approaches
Autor: | Doina Caragea, Emily Alfs, Pietro Poggi-Corradini, Sankardas Roy, Nathan Albin, Dewan Chaulagain |
---|---|
Rok vydání: | 2019 |
Předmět: |
Ground truth
business.industry Computer science Feature vector 02 engineering and technology Semi-supervised learning computer.software_genre Machine learning ComputingMethodologies_PATTERNRECOGNITION Discriminative model 020204 information systems mental disorders 0202 electrical engineering electronic engineering information engineering Malware 020201 artificial intelligence & image processing Weighted network Artificial intelligence Android (operating system) business computer Machine code |
Zdroj: | ASONAM |
DOI: | 10.1145/3341161.3343534 |
Popis: | The proliferation of Android applications has resulted in many malicious apps entering the market and causing significant damage. Robust techniques that determine if an app is malicious are greatly needed. We propose the use of network-based approaches to effectively separate malicious from benign apps, based on a small labeled dataset. The apps in our dataset come from the Google Play Store and have been scanned for malicious behavior using VirusTotal to produce a ground truth dataset with labels malicious or benign. The apps in the resulting dataset have been represented in the form of binary feature vectors (where the features represent permissions, intent actions, discriminative APIs, obfuscation signatures, and native code signatures). We have used these vectors to build a weighted network that captures the "closeness" between apps. We propagate labels from the labeled apps to unlabeled apps, and evaluate the effectiveness of the approaches studied using the F1-measure. We have conducted experiments to compare three variants of the label propagation approaches on datasets that consist of increasingly larger amounts of labeled data. |
Databáze: | OpenAIRE |
Externí odkaz: |