Abstract
Trojan Detection—the process of understanding the behaviour of a suspicious file has been the talk of the town these days. Existing approaches, e.g., signature-based, have not been able to classify them accurately as Trojans. This paper proposes TrojanDetector—a simple yet effective multi-layer hybrid approach for Trojan detection. TrojanDetector analyses every downloaded application and extracts and correlates its features on three layers (i.e., application-, user-, and package layer) to identify it as either a benign application or a Trojan. TrojanDetector adopts a hybrid approach, combining static and dynamic analysis characteristics, for feature extraction from any downloaded application. We have evaluated our scheme on three publicly available datasets, namely (i) CCCS- CIC-AndMal-2020, (ii) Cantagio-Mobile, and (iii) Virus share, by using simple yet state-of-the-art classifiers, namely, random forest (RF), decision tree (DT), support vector machine (SVM), and logistic regression (LR) in binary—class settings. SVM outperformed its counterparts and attained the highest accuracy of 96.64%. Extensive experimentation shows the effectiveness of our proposed Trojan detection scheme.
Funder
Open Access Publishing Fund of the Free University of Bozen-Bolzano
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference28 articles.
1. Wotring, B., and Potter, B. Host Integrity Monitoring: Using Osiris and Samhain, 2005.
2. Sharma, H., Govindan, K., Poonia, R.C., Kumar, S., and Wael, M. Advances in Computing and Intelligent Systems. Springer Nat., 2022.
3. A hybrid approach of mobile malware detection in Android;Tong;J. Parallel Distrib. Comput.,2017
4. ARPGE: A computer program to automatically reconstruct the parent grains from electron backscatter diffraction data;Cayron;J. Appl. Crystallogr.,2007
5. Odyssey: Creation, Analysis and Detection of Trojan Models;Edraki;IEEE Trans. Inf. Forensics Secur.,2021
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献