Cargando…
Detecting and classifying method based on similarity matching of Android malware behavior with profile
Mass-market mobile security threats have increased recently due to the growth of mobile technologies and the popularity of mobile devices. Accordingly, techniques have been introduced for identifying, classifying, and defending against mobile threats utilizing static, dynamic, on-device, and off-dev...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer International Publishing
2016
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4777979/ https://www.ncbi.nlm.nih.gov/pubmed/27006882 http://dx.doi.org/10.1186/s40064-016-1861-x |
_version_ | 1782419381415837696 |
---|---|
author | Jang, Jae-wook Yun, Jaesung Mohaisen, Aziz Woo, Jiyoung Kim, Huy Kang |
author_facet | Jang, Jae-wook Yun, Jaesung Mohaisen, Aziz Woo, Jiyoung Kim, Huy Kang |
author_sort | Jang, Jae-wook |
collection | PubMed |
description | Mass-market mobile security threats have increased recently due to the growth of mobile technologies and the popularity of mobile devices. Accordingly, techniques have been introduced for identifying, classifying, and defending against mobile threats utilizing static, dynamic, on-device, and off-device techniques. Static techniques are easy to evade, while dynamic techniques are expensive. On-device techniques are evasion, while off-device techniques need being always online. To address some of those shortcomings, we introduce Andro-profiler, a hybrid behavior based analysis and classification system for mobile malware. Andro-profiler main goals are efficiency, scalability, and accuracy. For that, Andro-profiler classifies malware by exploiting the behavior profiling extracted from the integrated system logs including system calls. Andro-profiler executes a malicious application on an emulator in order to generate the integrated system logs, and creates human-readable behavior profiles by analyzing the integrated system logs. By comparing the behavior profile of malicious application with representative behavior profile for each malware family using a weighted similarity matching technique, Andro-profiler detects and classifies it into malware families. The experiment results demonstrate that Andro-profiler is scalable, performs well in detecting and classifying malware with accuracy greater than 98 %, outperforms the existing state-of-the-art work, and is capable of identifying 0-day mobile malware samples. |
format | Online Article Text |
id | pubmed-4777979 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2016 |
publisher | Springer International Publishing |
record_format | MEDLINE/PubMed |
spelling | pubmed-47779792016-03-22 Detecting and classifying method based on similarity matching of Android malware behavior with profile Jang, Jae-wook Yun, Jaesung Mohaisen, Aziz Woo, Jiyoung Kim, Huy Kang Springerplus Research Mass-market mobile security threats have increased recently due to the growth of mobile technologies and the popularity of mobile devices. Accordingly, techniques have been introduced for identifying, classifying, and defending against mobile threats utilizing static, dynamic, on-device, and off-device techniques. Static techniques are easy to evade, while dynamic techniques are expensive. On-device techniques are evasion, while off-device techniques need being always online. To address some of those shortcomings, we introduce Andro-profiler, a hybrid behavior based analysis and classification system for mobile malware. Andro-profiler main goals are efficiency, scalability, and accuracy. For that, Andro-profiler classifies malware by exploiting the behavior profiling extracted from the integrated system logs including system calls. Andro-profiler executes a malicious application on an emulator in order to generate the integrated system logs, and creates human-readable behavior profiles by analyzing the integrated system logs. By comparing the behavior profile of malicious application with representative behavior profile for each malware family using a weighted similarity matching technique, Andro-profiler detects and classifies it into malware families. The experiment results demonstrate that Andro-profiler is scalable, performs well in detecting and classifying malware with accuracy greater than 98 %, outperforms the existing state-of-the-art work, and is capable of identifying 0-day mobile malware samples. Springer International Publishing 2016-03-03 /pmc/articles/PMC4777979/ /pubmed/27006882 http://dx.doi.org/10.1186/s40064-016-1861-x Text en © Jang et al. 2016 Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. |
spellingShingle | Research Jang, Jae-wook Yun, Jaesung Mohaisen, Aziz Woo, Jiyoung Kim, Huy Kang Detecting and classifying method based on similarity matching of Android malware behavior with profile |
title | Detecting and classifying method based on similarity matching of Android malware behavior with profile |
title_full | Detecting and classifying method based on similarity matching of Android malware behavior with profile |
title_fullStr | Detecting and classifying method based on similarity matching of Android malware behavior with profile |
title_full_unstemmed | Detecting and classifying method based on similarity matching of Android malware behavior with profile |
title_short | Detecting and classifying method based on similarity matching of Android malware behavior with profile |
title_sort | detecting and classifying method based on similarity matching of android malware behavior with profile |
topic | Research |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4777979/ https://www.ncbi.nlm.nih.gov/pubmed/27006882 http://dx.doi.org/10.1186/s40064-016-1861-x |
work_keys_str_mv | AT jangjaewook detectingandclassifyingmethodbasedonsimilaritymatchingofandroidmalwarebehaviorwithprofile AT yunjaesung detectingandclassifyingmethodbasedonsimilaritymatchingofandroidmalwarebehaviorwithprofile AT mohaisenaziz detectingandclassifyingmethodbasedonsimilaritymatchingofandroidmalwarebehaviorwithprofile AT woojiyoung detectingandclassifyingmethodbasedonsimilaritymatchingofandroidmalwarebehaviorwithprofile AT kimhuykang detectingandclassifyingmethodbasedonsimilaritymatchingofandroidmalwarebehaviorwithprofile |