首页> 外文OA文献 >A Multi-view Context-aware Approach to Android Malware Detection and Malicious Code Localization
【2h】

A Multi-view Context-aware Approach to Android Malware Detection and Malicious Code Localization

机译:一种针对android恶意软件检测和攻击的多视图上下文感知方法   恶意代码本地化

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Existing Android malware detection approaches use a variety of features suchas security sensitive APIs, system calls, control-flow structures andinformation flows in conjunction with Machine Learning classifiers to achieveaccurate detection. Each of these feature sets provides a unique semanticperspective (or view) of apps' behaviours with inherent strengths andlimitations. Meaning, some views are more amenable to detect certain attacksbut may not be suitable to characterise several other attacks. Most of theexisting malware detection approaches use only one (or a selected few) of theaforementioned feature sets which prevent them from detecting a vast majorityof attacks. Addressing this limitation, we propose MKLDroid, a unifiedframework that systematically integrates multiple views of apps for performingcomprehensive malware detection and malicious code localisation. The rationaleis that, while a malware app can disguise itself in some views, disguising inevery view while maintaining malicious intent will be much harder. MKLDroid uses a graph kernel to capture structural and contextual informationfrom apps' dependency graphs and identify malice code patterns in each view.Subsequently, it employs Multiple Kernel Learning (MKL) to find a weightedcombination of the views which yields the best detection accuracy. Besidesmulti-view learning, MKLDroid's unique and salient trait is its ability tolocate fine-grained malice code portions in dependency graphs (e.g.,methods/classes). Through our large-scale experiments on several datasets(incl. wild apps), we demonstrate that MKLDroid outperforms threestate-of-the-art techniques consistently, in terms of accuracy whilemaintaining comparable efficiency. In our malicious code localisationexperiments on a dataset of repackaged malware, MKLDroid was able to identifyall the malice classes with 94% average recall.
机译:现有的Android恶意软件检测方法结合机器学习分类器使用各种功能(例如安全敏感的API,系统调用,控制流结构和信息流)来实现准确的检测。这些功能集中的每一个都提供具有固有优势和局限性的应用程序行为的唯一语义视角(或视图)。这意味着,某些视图更适合检测某些攻击,但可能不适合表征其他几种攻击。大多数现有的恶意软件检测方法仅使用一个(或选定的少数几个)上述功能集,从而阻止了它们检测到绝大多数攻击。为了解决这个限制,我们提出了MKLDroid,这是一个统一的框架,可以系统地集成应用程序的多个视图,以执行全面的恶意软件检测和恶意代码本地化。尽管恶意软件应用程序可以在某些视图中伪装自己,但在保持恶意意图的同时伪装每个视图的理由将更加困难。 MKLDroid使用图内核从应用程序的依赖图捕获结构和上下文信息,并在每个视图中识别恶意代码模式,随后,它使用多核学习(MKL)来找到视图的加权组合,从而产生最佳的检测精度。除了多视图学习之外,MKLDroid的独特和显着特征是它能够在依赖关系图(例如方法/类)中定位细粒度的恶意代码部分。通过我们在多个数据集(包括野生应用程序)上的大规模实验,我们证明了MKLDroid在精度方面始终优于三种最新技术,同时保持了相当的效率。在我们对重新包装的恶意软件的数据集进行的恶意代码本地化实验中,MKLDroid能够以94%的平均召回率识别出所有恶意类别。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号