DOI QR코드

DOI QR Code

Detecting Android Malware Based on Analyzing Abnormal Behaviors of APK File

  • Received : 2021.06.05
  • Published : 2021.06.30

Abstract

The attack trend on end-users via mobile devices is increasing in both the danger level and the number of attacks. Especially, mobile devices using the Android operating system are being recognized as increasingly being exploited and attacked strongly. In addition, one of the recent attack methods on the Android operating system is to take advantage of Android Package Kit (APK) files. Therefore, the problem of early detecting and warning attacks on mobile devices using the Android operating system through the APK file is very necessary today. This paper proposes to use the method of analyzing abnormal behavior of APK files and use it as a basis to conclude about signs of malware attacking the Android operating system. In order to achieve this purpose, we propose 2 main tasks: i) analyzing and extracting abnormal behavior of APK files; ii) detecting malware in APK files based on behavior analysis techniques using machine learning or deep learning algorithms. The difference between our research and other related studies is that instead of focusing on analyzing and extracting typical features of APK files, we will try to analyze and enumerate all the features of the APK file as the basis for classifying malicious APK files and clean APK files.

Keywords

References

  1. Yue Liu, Chakkrit Tantithamthavorn, Li Li, Yepang Liu: Deep Learning for Android Malware Defenses: a Systematic Literature Review. ArXiv:2103.05292v1.
  2. Wang W., Zhao M., Gao Z., Xu G., Xian H., Li Y., Zhang X.: Constructing Features for Detecting Android Malicious Applications: Issues, Taxonomy and Directions. IEEE Access, vol. 7, pp. 67602-67631 (2019). doi:10.1109/access.2019.2918139.
  3. Yi Zhang, Yuexiang Yang, Xiaolei Wang: A Novel Android Malware Detection Approach Based on Convolutional Neural Network. In: Proc. of the 2nd International Conference on Cryptography, Security and Privacy, pp. 144-149 (March 2018). https://doi.org/10.1145/3199478.3199492
  4. Xu Jiang, Baolei Mao, Jun Guan, Xingli Huang: Android Malware Detection Using Fine-Grained Features. Scientific Programming (2020). https://doi.org/10.1155/2020/5190138.
  5. Abdurrahman Pekta, Tankut Acarman: Deep learning for effective Android malware detection using API call graph embeddings. Soft Computing. https://doi.org/10.1007/s00500-019-03940-5.
  6. Minghui Cai, Yuan Jiang, Cuiying Gao, Heng Li, Wei Yuan: Learning features from enhanced function call graphs for Android malware detection. Neurocomputing, vol. 423, pp. 301-307 (2021). https://doi.org/10.1016/j.neucom.2020.10.054
  7. Ali Feizollahm, Nor Badrul Anuar, Rosli Salleh, Guillermo Suarez-Tangil, Steven Furnell: AndroDialysis: Analysis of Android Intent Effectiveness in Malware Dectection. In: 30th IEEE/ACM International Conference on Automated Software Engineering (ASE) (2015).
  8. P. Faruki, V. Ganmoor, V. Laxmi, M.S. Gaur, A. Bharmal: AndroSimilar: robust statistical feature signature for Android malware detection. In: Proc. of the 6th International Conference on Security of Information and Networks, ACM, pp. 152-159 (2013).
  9. Asaf Shabtai Uri Kanonov, Yuval Elovici, Chanan Glezer, Yael Weiss: Andromaly: a behavioral malware detection framework for android devices. Journal of Intelligent Information Systems, vol. 38, pp. 161-190 (2012). https://doi.org/10.1007/s10844-010-0148-x
  10. Dataset android malware permission: https://www.kaggle.com/xwolf12/datasetandroidpermissions
  11. S.S. Shai, B.D. Shai: Understanding Machine Learning: From Theory to Algorithms. Cambridge University Press (2014).
  12. JohnShawe-Taylor, ShiliangSun: Kernel Methods and Support Vector Machines. Academic Press Library in Signal Processing, vol. 1, pp. 857-881 (2014). https://doi.org/10.1016/B978-0-12-396502-8.00016-4
  13. Leo Breiman: Random Forests. Machine Learning, vol. 4(1), pp. 5-32 (2001). https://doi.org/10.1023/A:1022695526916
  14. Daniel Svozil, Vladimir Kvasnicka, Jiri Pospichal: Introduction to multi-layer feed-forward neural networks. Chemometrics and Intelligent Laboratory Systems, vol. 39(1), pp. 43-62. https://doi.org/10.1016/S0169-7439(97)00061-0
  15. Zewen Li, Wenjie Yang, Shouheng Peng, Fan Liu: A Survey of Convolutional Neural Networks: Analysis, Applications, and Prospects (2020). ArXiv:2004.02806.
  16. Keiron O'Shea, Ryan Nash: An Introduction to Convolutional Neural Networks (2015). ArXiv:1511.08458.
  17. Sepp Hochreiter, Jurgen Schmidhuber: Long Short-Term Memory. Neural Computation, vol. 9(8), pp. 1735-1780 (1997). https://doi.org/10.1162/neco.1997.9.8.1735
  18. https://www.kaggle.com/razgallah/apps-base
  19. https://www.kaggle.com/tamirkh/apks-dataset
  20. https://www.kaggle.com/covaanalyst1/cova-dataset