基于权限与系统调用集成的本体技术的Android恶意应用检测

Da-peng Chen, Hongmei Zhang, Xiangli Zhang, Demin Wang
{"title":"基于权限与系统调用集成的本体技术的Android恶意应用检测","authors":"Da-peng Chen, Hongmei Zhang, Xiangli Zhang, Demin Wang","doi":"10.1109/IIKI.2016.56","DOIUrl":null,"url":null,"abstract":"In this paper, for sharing the security knowledge of smart phone applications and detecting the malicious applications, one new method was put forward based on ontology technology which considered permissions and system calls information with JESS inference engine. In order to get final feature information list and define SWRL rules, this paper extracted and analyzed permissions and system calls information which were significant and representative ones. The constructed application ontology referred to application domain knowledge including permissions and system calls etc. so that explicit and tacit knowledge could be shared. By selecting defined SWRL rules and running JESS inference engine, this paper demonstrated that our detection method could effectively classify malware and benign. Experimental results showed that the accuracy reached 95.89%. Moreover, through a comparative analysis, it could be seen that the application security detection based on ontology method outperformed two existing Android malware detection schemes for combining two characteristic information-permissions and system calls.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Android Malicious Application Detection Based on Ontology Technology Integrated with Permissions and System Calls\",\"authors\":\"Da-peng Chen, Hongmei Zhang, Xiangli Zhang, Demin Wang\",\"doi\":\"10.1109/IIKI.2016.56\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, for sharing the security knowledge of smart phone applications and detecting the malicious applications, one new method was put forward based on ontology technology which considered permissions and system calls information with JESS inference engine. In order to get final feature information list and define SWRL rules, this paper extracted and analyzed permissions and system calls information which were significant and representative ones. The constructed application ontology referred to application domain knowledge including permissions and system calls etc. so that explicit and tacit knowledge could be shared. By selecting defined SWRL rules and running JESS inference engine, this paper demonstrated that our detection method could effectively classify malware and benign. Experimental results showed that the accuracy reached 95.89%. Moreover, through a comparative analysis, it could be seen that the application security detection based on ontology method outperformed two existing Android malware detection schemes for combining two characteristic information-permissions and system calls.\",\"PeriodicalId\":371106,\"journal\":{\"name\":\"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IIKI.2016.56\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IIKI.2016.56","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

为了实现智能手机应用安全知识的共享和恶意应用的检测,本文提出了一种基于本体技术的智能手机应用安全知识共享方法,该方法结合JESS推理引擎考虑权限和系统调用信息。为了得到最终的特征信息列表和定义SWRL规则,本文提取并分析了具有重要意义和代表性的权限和系统调用信息。构建的应用本体引用了包括权限、系统调用等应用领域知识,实现了显性知识和隐性知识的共享。通过选择已定义的SWRL规则并运行JESS推理引擎,验证了我们的检测方法可以有效地对恶意和良性进行分类。实验结果表明,准确率达到95.89%。此外,通过对比分析可以看出,基于本体方法的应用安全检测优于现有的两种结合两种特征信息——权限和系统调用的Android恶意软件检测方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Android Malicious Application Detection Based on Ontology Technology Integrated with Permissions and System Calls
In this paper, for sharing the security knowledge of smart phone applications and detecting the malicious applications, one new method was put forward based on ontology technology which considered permissions and system calls information with JESS inference engine. In order to get final feature information list and define SWRL rules, this paper extracted and analyzed permissions and system calls information which were significant and representative ones. The constructed application ontology referred to application domain knowledge including permissions and system calls etc. so that explicit and tacit knowledge could be shared. By selecting defined SWRL rules and running JESS inference engine, this paper demonstrated that our detection method could effectively classify malware and benign. Experimental results showed that the accuracy reached 95.89%. Moreover, through a comparative analysis, it could be seen that the application security detection based on ontology method outperformed two existing Android malware detection schemes for combining two characteristic information-permissions and system calls.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Research on the Evaluation of Product Quality Perceived Value Based on Text Mining and Fuzzy Comprehensive Evaluation A New Pre-copy Strategy for Live Migration of Virtual Machines Hbase Based Surveillance Video Processing, Storage and Retrieval Mutual Information-Based Feature Selection and Ensemble Learning for Classification Implicit Correlation Intensity Mining Based on the Monte Carlo Method with Attenuation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1