4.2 Article

A Mobile Malware Detection Method Based on Malicious Subgraphs Mining

期刊

SECURITY AND COMMUNICATION NETWORKS
卷 2021, 期 -, 页码 -

出版社

WILEY-HINDAWI
DOI: 10.1155/2021/5593178

关键词

-

资金

  1. Sichuan Science and Technology Program [2021JDRC0075]
  2. Fundamental Research Funds for the Central Universities, Southwest Minzu University [2020NZD02]
  3. Chengdu Science and Technology Program [2021GH03-00001-HZ]

向作者/读者索取更多资源

This paper proposes a new Android malware identification approach based on malicious subgraph mining to improve the detection performance of large-scale graph structure analysis. By generating malicious subgraphs and putting them into the feature set, automatic identification and classification of malware can be achieved.
As mobile phone is widely used in social network communication, it attracts numerous malicious attacks, which seriously threaten users' personal privacy and data security. To improve the resilience to attack technologies, structural information analysis has been widely applied in mobile malware detection. However, the rapid improvement of mobile applications has brought an impressive growth of their internal structure in scale and attack technologies. It makes the timely analysis of structural information and malicious feature generation a heavy burden. In this paper, we propose a new Android malware identification approach based on malicious subgraph mining to improve the detection performance of large-scale graph structure analysis. Firstly, function call graphs (FCGs), sensitive permissions, and application programming interfaces (APIs) are generated from the decompiled files of malware. Secondly, two kinds of malicious subgraphs are generated from malware's decompiled files and put into the feature set. At last, test applications' safety can be automatically identified and classified into malware families by matching their FCGs with malicious structural features. To evaluate our approach, a dataset of 11,520 malware and benign applications is established. Experimental results indicate that our approach has better performance than three previous works and Androguard.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.2
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据