Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Detecting and classifying method based on similarity matching of Android malware behavior with profile

Authors
Jang, Jae-WookYun, JaesungMohaisen, AzizWoo, JiyoungKim, Huy Kang
Issue Date
3-3월-2016
Publisher
SPRINGER INTERNATIONAL PUBLISHING AG
Keywords
Behavior profiling; Similarity; System call; Android; Malware
Citation
SPRINGERPLUS, v.5
Indexed
SCIE
SCOPUS
Journal Title
SPRINGERPLUS
Volume
5
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/89242
DOI
10.1186/s40064-016-1861-x
ISSN
2193-1801
Abstract
Mass-market mobile security threats have increased recently due to the growth of mobile technologies and the popularity of mobile devices. Accordingly, techniques have been introduced for identifying, classifying, and defending against mobile threats utilizing static, dynamic, on-device, and off-device techniques. Static techniques are easy to evade, while dynamic techniques are expensive. On-device techniques are evasion, while off-device techniques need being always online. To address some of those shortcomings, we introduce Andro-profiler, a hybrid behavior based analysis and classification system for mobile malware. Andro-profiler main goals are efficiency, scalability, and accuracy. For that, Andro-profiler classifies malware by exploiting the behavior profiling extracted from the integrated system logs including system calls. Andro-profiler executes a malicious application on an emulator in order to generate the integrated system logs, and creates human-readable behavior profiles by analyzing the integrated system logs. By comparing the behavior profile of malicious application with representative behavior profile for each malware family using a weighted similarity matching technique, Andro-profiler detects and classifies it into malware families. The experiment results demonstrate that Andro-profiler is scalable, performs well in detecting and classifying malware with accuracy greater than 98 %, outperforms the existing state-of-the-art work, and is capable of identifying 0-day mobile malware samples.
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE