Cargando…

Detecting and classifying method based on similarity matching of Android malware behavior with profile

Mass-market mobile security threats have increased recently due to the growth of mobile technologies and the popularity of mobile devices. Accordingly, techniques have been introduced for identifying, classifying, and defending against mobile threats utilizing static, dynamic, on-device, and off-dev...

Descripción completa

Detalles Bibliográficos
Autores principales: Jang, Jae-wook, Yun, Jaesung, Mohaisen, Aziz, Woo, Jiyoung, Kim, Huy Kang
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer International Publishing 2016
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4777979/
https://www.ncbi.nlm.nih.gov/pubmed/27006882
http://dx.doi.org/10.1186/s40064-016-1861-x
_version_ 1782419381415837696
author Jang, Jae-wook
Yun, Jaesung
Mohaisen, Aziz
Woo, Jiyoung
Kim, Huy Kang
author_facet Jang, Jae-wook
Yun, Jaesung
Mohaisen, Aziz
Woo, Jiyoung
Kim, Huy Kang
author_sort Jang, Jae-wook
collection PubMed
description Mass-market mobile security threats have increased recently due to the growth of mobile technologies and the popularity of mobile devices. Accordingly, techniques have been introduced for identifying, classifying, and defending against mobile threats utilizing static, dynamic, on-device, and off-device techniques. Static techniques are easy to evade, while dynamic techniques are expensive. On-device techniques are evasion, while off-device techniques need being always online. To address some of those shortcomings, we introduce Andro-profiler, a hybrid behavior based analysis and classification system for mobile malware. Andro-profiler main goals are efficiency, scalability, and accuracy. For that, Andro-profiler classifies malware by exploiting the behavior profiling extracted from the integrated system logs including system calls. Andro-profiler executes a malicious application on an emulator in order to generate the integrated system logs, and creates human-readable behavior profiles by analyzing the integrated system logs. By comparing the behavior profile of malicious application with representative behavior profile for each malware family using a weighted similarity matching technique, Andro-profiler detects and classifies it into malware families. The experiment results demonstrate that Andro-profiler is scalable, performs well in detecting and classifying malware with accuracy greater than 98 %, outperforms the existing state-of-the-art work, and is capable of identifying 0-day mobile malware samples.
format Online
Article
Text
id pubmed-4777979
institution National Center for Biotechnology Information
language English
publishDate 2016
publisher Springer International Publishing
record_format MEDLINE/PubMed
spelling pubmed-47779792016-03-22 Detecting and classifying method based on similarity matching of Android malware behavior with profile Jang, Jae-wook Yun, Jaesung Mohaisen, Aziz Woo, Jiyoung Kim, Huy Kang Springerplus Research Mass-market mobile security threats have increased recently due to the growth of mobile technologies and the popularity of mobile devices. Accordingly, techniques have been introduced for identifying, classifying, and defending against mobile threats utilizing static, dynamic, on-device, and off-device techniques. Static techniques are easy to evade, while dynamic techniques are expensive. On-device techniques are evasion, while off-device techniques need being always online. To address some of those shortcomings, we introduce Andro-profiler, a hybrid behavior based analysis and classification system for mobile malware. Andro-profiler main goals are efficiency, scalability, and accuracy. For that, Andro-profiler classifies malware by exploiting the behavior profiling extracted from the integrated system logs including system calls. Andro-profiler executes a malicious application on an emulator in order to generate the integrated system logs, and creates human-readable behavior profiles by analyzing the integrated system logs. By comparing the behavior profile of malicious application with representative behavior profile for each malware family using a weighted similarity matching technique, Andro-profiler detects and classifies it into malware families. The experiment results demonstrate that Andro-profiler is scalable, performs well in detecting and classifying malware with accuracy greater than 98 %, outperforms the existing state-of-the-art work, and is capable of identifying 0-day mobile malware samples. Springer International Publishing 2016-03-03 /pmc/articles/PMC4777979/ /pubmed/27006882 http://dx.doi.org/10.1186/s40064-016-1861-x Text en © Jang et al. 2016 Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
spellingShingle Research
Jang, Jae-wook
Yun, Jaesung
Mohaisen, Aziz
Woo, Jiyoung
Kim, Huy Kang
Detecting and classifying method based on similarity matching of Android malware behavior with profile
title Detecting and classifying method based on similarity matching of Android malware behavior with profile
title_full Detecting and classifying method based on similarity matching of Android malware behavior with profile
title_fullStr Detecting and classifying method based on similarity matching of Android malware behavior with profile
title_full_unstemmed Detecting and classifying method based on similarity matching of Android malware behavior with profile
title_short Detecting and classifying method based on similarity matching of Android malware behavior with profile
title_sort detecting and classifying method based on similarity matching of android malware behavior with profile
topic Research
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4777979/
https://www.ncbi.nlm.nih.gov/pubmed/27006882
http://dx.doi.org/10.1186/s40064-016-1861-x
work_keys_str_mv AT jangjaewook detectingandclassifyingmethodbasedonsimilaritymatchingofandroidmalwarebehaviorwithprofile
AT yunjaesung detectingandclassifyingmethodbasedonsimilaritymatchingofandroidmalwarebehaviorwithprofile
AT mohaisenaziz detectingandclassifyingmethodbasedonsimilaritymatchingofandroidmalwarebehaviorwithprofile
AT woojiyoung detectingandclassifyingmethodbasedonsimilaritymatchingofandroidmalwarebehaviorwithprofile
AT kimhuykang detectingandclassifyingmethodbasedonsimilaritymatchingofandroidmalwarebehaviorwithprofile