Permission Sensitivity-Based Malicious Application Detection for Android

Author:

Song Yubo12ORCID,Geng Yijin12,Wang Junbo34,Gao Shang5,Shi Wei12

Affiliation:

1. Key Laboratory of Computer Networking Technology of Jiangsu Province, School of Cyber Science and Engineering, Southeast University, Nanjing 211189, China

2. Purple Mountain Laboratories, Nanjing 211189, China

3. School of Information Science and Engineering, Southeast University, Nanjing 211189, China

4. National Mobile Communications Research Laboratory, Nanjing 211189, China

5. Computing Department, The Hong Kong Polytheistic University, Hung Hom, Hong Kong

Abstract

Since a growing number of malicious applications attempt to steal users’ private data by illegally invoking permissions, application stores have carried out many malware detection methods based on application permissions. However, most of them ignore specific permission combinations and application categories that affect the detection accuracy. The features they extracted are neither representative enough to distinguish benign and malicious applications. For these problems, an Android malware detection method based on permission sensitivity is proposed. First, for each kind of application categories, the permission features and permission combination features are extracted. The sensitive permission feature set corresponding to each category label is then obtained by the feature selection method based on permission sensitivity. In the following step, the permission call situation of the application to be detected is compared with the sensitive permission feature set, and the weight allocation method is used to quantify this information into numerical features. In the proposed method of malicious application detection, three machine-learning algorithms are selected to construct the classifier model and optimize the parameters. Compared with traditional methods, the proposed method consumed 60.94% less time while still achieving high accuracy of up to 92.17%.

Funder

National Natural Science Foundation of China

Publisher

Hindawi Limited

Subject

Computer Networks and Communications,Information Systems

Cited by 19 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Research on Quantum Encryption Information Security Protection Technology for Distribution Networks;2024 6th International Conference on Energy Systems and Electrical Power (ICESEP);2024-06-21

2. Intelligent Recognition and Classification of IoT Devices via Information Physics-Based Multi-Source Data Association;2024 5th International Conference on Computer Engineering and Application (ICCEA);2024-04-12

3. Privacy Protection of Electrical Data With Scene Differentiation Based on Generative Adversarial Networks;2023 3rd International Conference on Electronic Information Engineering and Computer Communication (EIECC);2023-12-22

4. Traceback of Attack Chains in an Intelligent Power Grid ATT&CK Framework Based on Multi-Labels;International Conference on Mathematics and Machine Learning;2023-11-24

5. Secure Access for Massive Devices in the Industrial Internet of Things (IIoT);2023 4th International Conference on Computer Engineering and Intelligent Control (ICCEIC);2023-10-20

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3