4.2 Article

A Mobile Malware Detection Method Based on Malicious Subgraphs Mining

Journal

SECURITY AND COMMUNICATION NETWORKS
Volume 2021, Issue -, Pages -

Publisher

WILEY-HINDAWI
DOI: 10.1155/2021/5593178

Keywords

-

Funding

  1. Sichuan Science and Technology Program [2021JDRC0075]
  2. Fundamental Research Funds for the Central Universities, Southwest Minzu University [2020NZD02]
  3. Chengdu Science and Technology Program [2021GH03-00001-HZ]

Ask authors/readers for more resources

This paper proposes a new Android malware identification approach based on malicious subgraph mining to improve the detection performance of large-scale graph structure analysis. By generating malicious subgraphs and putting them into the feature set, automatic identification and classification of malware can be achieved.
As mobile phone is widely used in social network communication, it attracts numerous malicious attacks, which seriously threaten users' personal privacy and data security. To improve the resilience to attack technologies, structural information analysis has been widely applied in mobile malware detection. However, the rapid improvement of mobile applications has brought an impressive growth of their internal structure in scale and attack technologies. It makes the timely analysis of structural information and malicious feature generation a heavy burden. In this paper, we propose a new Android malware identification approach based on malicious subgraph mining to improve the detection performance of large-scale graph structure analysis. Firstly, function call graphs (FCGs), sensitive permissions, and application programming interfaces (APIs) are generated from the decompiled files of malware. Secondly, two kinds of malicious subgraphs are generated from malware's decompiled files and put into the feature set. At last, test applications' safety can be automatically identified and classified into malware families by matching their FCGs with malicious structural features. To evaluate our approach, a dataset of 11,520 malware and benign applications is established. Experimental results indicate that our approach has better performance than three previous works and Androguard.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.2
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available