Cargando…

OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning

Due to the openness of an Android system, many Internet of Things (IoT) devices are running the Android system and Android devices have become a common control terminal for IoT devices because of various sensors on them. With the popularity of IoT devices, malware on Android-based IoT devices is als...

Descripción completa

Detalles Bibliográficos
Autores principales: Niu, Weina, Cao, Rong, Zhang, Xiaosong, Ding, Kangyi, Zhang, Kaimeng, Li, Ting
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7374318/
https://www.ncbi.nlm.nih.gov/pubmed/32610606
http://dx.doi.org/10.3390/s20133645
_version_ 1783561671052099584
author Niu, Weina
Cao, Rong
Zhang, Xiaosong
Ding, Kangyi
Zhang, Kaimeng
Li, Ting
author_facet Niu, Weina
Cao, Rong
Zhang, Xiaosong
Ding, Kangyi
Zhang, Kaimeng
Li, Ting
author_sort Niu, Weina
collection PubMed
description Due to the openness of an Android system, many Internet of Things (IoT) devices are running the Android system and Android devices have become a common control terminal for IoT devices because of various sensors on them. With the popularity of IoT devices, malware on Android-based IoT devices is also increasing. People’s lives and privacy security are threatened. To reduce such threat, many researchers have proposed new methods to detect Android malware. Currently, most malware detection products on the market are based on malware signatures, which have a fast detection speed and normally a low false alarm rate for known malware families. However, they cannot detect unknown malware and are easily evaded by malware that is confused or packaged. Many new solutions use syntactic features and machine learning techniques to classify Android malware. It has been known that analysis of the Function Call Graph (FCG) can capture behavioral features of malware well. This paper presents a new approach to classifying Android malware based on deep learning and OpCode-level FCG. The FCG is obtained through static analysis of Operation Code (OpCode), and the deep learning model we used is the Long Short-Term Memory (LSTM). We conducted experiments on a dataset with 1796 Android malware samples classified into two categories (obtained from Virusshare and AndroZoo) and 1000 benign Android apps. Our experimental results showed that our proposed approach with an accuracy of [Formula: see text] outperforms the state-of-the-art methods such as those proposed by Nikola et al. and Hou et al. (IJCAI-18) with the accuracy of [Formula: see text] and [Formula: see text] , respectively. The time consumption of our proposed approach is less than the other two methods.
format Online
Article
Text
id pubmed-7374318
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-73743182020-08-06 OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning Niu, Weina Cao, Rong Zhang, Xiaosong Ding, Kangyi Zhang, Kaimeng Li, Ting Sensors (Basel) Article Due to the openness of an Android system, many Internet of Things (IoT) devices are running the Android system and Android devices have become a common control terminal for IoT devices because of various sensors on them. With the popularity of IoT devices, malware on Android-based IoT devices is also increasing. People’s lives and privacy security are threatened. To reduce such threat, many researchers have proposed new methods to detect Android malware. Currently, most malware detection products on the market are based on malware signatures, which have a fast detection speed and normally a low false alarm rate for known malware families. However, they cannot detect unknown malware and are easily evaded by malware that is confused or packaged. Many new solutions use syntactic features and machine learning techniques to classify Android malware. It has been known that analysis of the Function Call Graph (FCG) can capture behavioral features of malware well. This paper presents a new approach to classifying Android malware based on deep learning and OpCode-level FCG. The FCG is obtained through static analysis of Operation Code (OpCode), and the deep learning model we used is the Long Short-Term Memory (LSTM). We conducted experiments on a dataset with 1796 Android malware samples classified into two categories (obtained from Virusshare and AndroZoo) and 1000 benign Android apps. Our experimental results showed that our proposed approach with an accuracy of [Formula: see text] outperforms the state-of-the-art methods such as those proposed by Nikola et al. and Hou et al. (IJCAI-18) with the accuracy of [Formula: see text] and [Formula: see text] , respectively. The time consumption of our proposed approach is less than the other two methods. MDPI 2020-06-29 /pmc/articles/PMC7374318/ /pubmed/32610606 http://dx.doi.org/10.3390/s20133645 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Niu, Weina
Cao, Rong
Zhang, Xiaosong
Ding, Kangyi
Zhang, Kaimeng
Li, Ting
OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning
title OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning
title_full OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning
title_fullStr OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning
title_full_unstemmed OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning
title_short OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning
title_sort opcode-level function call graph based android malware classification using deep learning
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7374318/
https://www.ncbi.nlm.nih.gov/pubmed/32610606
http://dx.doi.org/10.3390/s20133645
work_keys_str_mv AT niuweina opcodelevelfunctioncallgraphbasedandroidmalwareclassificationusingdeeplearning
AT caorong opcodelevelfunctioncallgraphbasedandroidmalwareclassificationusingdeeplearning
AT zhangxiaosong opcodelevelfunctioncallgraphbasedandroidmalwareclassificationusingdeeplearning
AT dingkangyi opcodelevelfunctioncallgraphbasedandroidmalwareclassificationusingdeeplearning
AT zhangkaimeng opcodelevelfunctioncallgraphbasedandroidmalwareclassificationusingdeeplearning
AT liting opcodelevelfunctioncallgraphbasedandroidmalwareclassificationusingdeeplearning