An android malware detection method based on system behavior sequences
CSTR:
Author:
Affiliation:

Clc Number:

TP309

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    At present, behavior features of machine learning based Android malicious code detecting approaches are independent from each other, whereas the sequential relationships between behavior features could indicate malicious behavior. In order to furtherly improve the detection accuracy, an Android malicious code detection method based on the features of system behavior sequence was proposed. Firstly, the sequences of system activities including sensitive API calls, file access, data transmission, etc. were extracted. Next, based on Markov chain model the system behavior sequences were transformed into state transition sequence, and state transition probability matrix were created. Then, the state transition probability matrix and the state occurrence frequency were used as feature sets to train the SAEs model. Finally, we examined the performance of the trained SAEs model on a dataset. The experimental results show that the proposed method performed better than the typical malicious code detection method on accuracy, precision and recall.

    Reference
    Related
    Cited by
Get Citation

杨吉云,陈钢,鄢然,吕建斌.一种基于系统行为序列特征的Android恶意代码检测方法[J].重庆大学学报,2020,43(9):54~63

Copy
Related Videos

Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:
  • Revised:
  • Adopted:
  • Online: September 29,2020
  • Published:
Article QR Code