{"title":"基于动态分析的android恶意软件检测","authors":"T. Bhatia, Rishabh Kaushal","doi":"10.1109/CyberSecPODS.2017.8074847","DOIUrl":null,"url":null,"abstract":"Android is the most preferable target for malware attacks due to its increased popularity amongst other operating systems for Smartphone devices. Owing to its open architecture and large user base, it provides the developers with an open access to its code base and a large surface area to launch their malicious activities. This paper presents an approach to perform dynamic analysis of android applications to classify the applications as malicious or non malicious. To this end we have developed a syscall-capture system which collects and extracts the system call traces of all the applications during their run-time interactions with the phone platform. Subsequently all the collected system call data is aggregated and analysed to detect and classify the behaviour of Android applications. We have used our system to analyse the behaviour of 50 malicious applications obtained from the Android Malware Genome Project and 50 benign applications obtained from the Google Play Store. With the aim to classify the behaviour of these applications, we have considered the frequency of system calls made by each application as the prime feature set. To this effect we have achieved an acceptable levels of accuracy in correctly classifying the application as malicious or benign using the J48 Decision Tree algorithm and the Random Forest algorithm.","PeriodicalId":203945,"journal":{"name":"2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"50","resultStr":"{\"title\":\"Malware detection in android based on dynamic analysis\",\"authors\":\"T. Bhatia, Rishabh Kaushal\",\"doi\":\"10.1109/CyberSecPODS.2017.8074847\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Android is the most preferable target for malware attacks due to its increased popularity amongst other operating systems for Smartphone devices. Owing to its open architecture and large user base, it provides the developers with an open access to its code base and a large surface area to launch their malicious activities. This paper presents an approach to perform dynamic analysis of android applications to classify the applications as malicious or non malicious. To this end we have developed a syscall-capture system which collects and extracts the system call traces of all the applications during their run-time interactions with the phone platform. Subsequently all the collected system call data is aggregated and analysed to detect and classify the behaviour of Android applications. We have used our system to analyse the behaviour of 50 malicious applications obtained from the Android Malware Genome Project and 50 benign applications obtained from the Google Play Store. With the aim to classify the behaviour of these applications, we have considered the frequency of system calls made by each application as the prime feature set. To this effect we have achieved an acceptable levels of accuracy in correctly classifying the application as malicious or benign using the J48 Decision Tree algorithm and the Random Forest algorithm.\",\"PeriodicalId\":203945,\"journal\":{\"name\":\"2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security)\",\"volume\":\"42 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"50\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CyberSecPODS.2017.8074847\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CyberSecPODS.2017.8074847","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Malware detection in android based on dynamic analysis
Android is the most preferable target for malware attacks due to its increased popularity amongst other operating systems for Smartphone devices. Owing to its open architecture and large user base, it provides the developers with an open access to its code base and a large surface area to launch their malicious activities. This paper presents an approach to perform dynamic analysis of android applications to classify the applications as malicious or non malicious. To this end we have developed a syscall-capture system which collects and extracts the system call traces of all the applications during their run-time interactions with the phone platform. Subsequently all the collected system call data is aggregated and analysed to detect and classify the behaviour of Android applications. We have used our system to analyse the behaviour of 50 malicious applications obtained from the Android Malware Genome Project and 50 benign applications obtained from the Google Play Store. With the aim to classify the behaviour of these applications, we have considered the frequency of system calls made by each application as the prime feature set. To this effect we have achieved an acceptable levels of accuracy in correctly classifying the application as malicious or benign using the J48 Decision Tree algorithm and the Random Forest algorithm.