{"title":"基于url的基于机器学习的Android恶意软件动态监控","authors":"O. Somarriba, Henry Jaentschke Urbina","doi":"10.1109/CONCAPAN48024.2022.9997633","DOIUrl":null,"url":null,"abstract":"Android malware depend heavily on DNS traffic to provide flexible communications between compromised smart devices and malicious infrastructure. Nevertheless, we found that there is a gap between connecting DNS queries requests by smart devices and the logs at the DNS-service network level to work altogether. So, this paper combines and correlates two approaches: top-down detection by identifying malware domains using DNS traces at the network level, and bottom-up detection at the device level using the dynamic analysis in order to capture the URLs requested on a number of applications to pinpoint the malware. Here, we propose a URL-based dynamic monitoring of Android malware, with two parts, namely: (i) a client side which is a DNS sniffer that captures and classifies (through the usage of blacklists) the URL(s) requested by app(s) under scrutiny running on the smart device, and (ii) a central server where these URLs are collected and classified by using a machine learning algorithms and where a visualization takes place of the most malware attacks detected. Addditionally, the malicious URLs discovered are used in order to carry out a string pattern matching search into the DNS logs of DSN servers to pinpoint another infected device. Our experimental results with the proposed monitoring system using the Random Forest algorithm show, regarding the F1-Score, a better performance than the previous works with Decision Tree algorithm such as J.48 classifier.","PeriodicalId":138415,"journal":{"name":"2022 IEEE 40th Central America and Panama Convention (CONCAPAN)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"URL-Based Dynamic Monitoring of Android Malware using Machine Learning\",\"authors\":\"O. Somarriba, Henry Jaentschke Urbina\",\"doi\":\"10.1109/CONCAPAN48024.2022.9997633\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Android malware depend heavily on DNS traffic to provide flexible communications between compromised smart devices and malicious infrastructure. Nevertheless, we found that there is a gap between connecting DNS queries requests by smart devices and the logs at the DNS-service network level to work altogether. So, this paper combines and correlates two approaches: top-down detection by identifying malware domains using DNS traces at the network level, and bottom-up detection at the device level using the dynamic analysis in order to capture the URLs requested on a number of applications to pinpoint the malware. Here, we propose a URL-based dynamic monitoring of Android malware, with two parts, namely: (i) a client side which is a DNS sniffer that captures and classifies (through the usage of blacklists) the URL(s) requested by app(s) under scrutiny running on the smart device, and (ii) a central server where these URLs are collected and classified by using a machine learning algorithms and where a visualization takes place of the most malware attacks detected. Addditionally, the malicious URLs discovered are used in order to carry out a string pattern matching search into the DNS logs of DSN servers to pinpoint another infected device. Our experimental results with the proposed monitoring system using the Random Forest algorithm show, regarding the F1-Score, a better performance than the previous works with Decision Tree algorithm such as J.48 classifier.\",\"PeriodicalId\":138415,\"journal\":{\"name\":\"2022 IEEE 40th Central America and Panama Convention (CONCAPAN)\",\"volume\":\"78 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 40th Central America and Panama Convention (CONCAPAN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CONCAPAN48024.2022.9997633\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 40th Central America and Panama Convention (CONCAPAN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CONCAPAN48024.2022.9997633","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
URL-Based Dynamic Monitoring of Android Malware using Machine Learning
Android malware depend heavily on DNS traffic to provide flexible communications between compromised smart devices and malicious infrastructure. Nevertheless, we found that there is a gap between connecting DNS queries requests by smart devices and the logs at the DNS-service network level to work altogether. So, this paper combines and correlates two approaches: top-down detection by identifying malware domains using DNS traces at the network level, and bottom-up detection at the device level using the dynamic analysis in order to capture the URLs requested on a number of applications to pinpoint the malware. Here, we propose a URL-based dynamic monitoring of Android malware, with two parts, namely: (i) a client side which is a DNS sniffer that captures and classifies (through the usage of blacklists) the URL(s) requested by app(s) under scrutiny running on the smart device, and (ii) a central server where these URLs are collected and classified by using a machine learning algorithms and where a visualization takes place of the most malware attacks detected. Addditionally, the malicious URLs discovered are used in order to carry out a string pattern matching search into the DNS logs of DSN servers to pinpoint another infected device. Our experimental results with the proposed monitoring system using the Random Forest algorithm show, regarding the F1-Score, a better performance than the previous works with Decision Tree algorithm such as J.48 classifier.