期刊文献+

基于非用户操作序列的恶意软件检测方法 被引量:6

Malware detection approach based on non-user operating sequence
下载PDF
导出
摘要 针对Android恶意软件持续大幅增加的现状以及恶意软件检测能力不足这一问题,提出了一种基于非用户操作序列的静态检测方法。首先,通过对恶意软件进行逆向工程分析,提取出恶意软件的应用程序编程接口(API)调用信息;然后,采用广度优先遍历算法构建恶意软件的函数调用流程图;进而,从函数流程图中提取出其中的非用户操作序列形成恶意行为库;最后,采用编辑距离算法计算待检测样本与恶意行为库中的非用户操作序列的相似度进行恶意软件识别。在对360个恶意样本和300的正常样本进行的检测中,所提方法可达到90.8%的召回率和90.3%的正确率。与Android恶意软件检测系统Androguard相比,所提方法在恶意样本检测中召回率提高了30个百分点;与Flow Droid方法相比,所提方法在正常样本检测中准确率提高了11个百分点,在恶意样本检测中召回率提高了4.4个百分点。实验结果表明,所提方法提高了恶意软件检测的召回率,有效提升恶意软件的检测效果。 : Considering rapid growth of Android malware and poor capability of detecting malware, a static detection method based on non-user operation sequences was proposed. Firstly, the Application Programming Interface (API) call information of malware was extracted by reverse engineering analysis. Secondly, the malware's function-call graph was established by using breadth-first traversal algorithm; then, non-user operation sequence was extracted from the function-call graph to form malicious behavior database. Finally, the similarity of the detected sample and non-user operation sequence in the malicious behavior database was calculated by using the edit distance algorithm for malware identification. In the detection of 360 malicious samples and 300 normal samples, the proposed method could reach the recall rate of 90.8% and the accuracy rate of 90.3%. Compared with the Android malware detection system Andraguard, the recall rate of the proposed method increased by 30 percentage points in the detection of malicious samples; and compared with the FlowDroid method, the precision rate increased by 11 percentage points in the detection of normal sample and the recall rate increased by 4.4 percentage points in the detection of malicious samples. The experimental results show that the proposed method improves the recall rate of malware detection and promotes the detection effect of malware.
出处 《计算机应用》 CSCD 北大核心 2018年第1期56-60,66,共6页 journal of Computer Applications
基金 国家自然科学基金资助项目(61303263)~~
关键词 ANDROID 恶意软件 静态检测 函数调用图 应用程序编程接口调用 Android malware static detection function-call graph Application Programming Interface (API) call
  • 相关文献

参考文献3

二级参考文献244

  • 1Steven M P.Contrary to what you've heard,Android is almost impenetrable to malware[EB/OL].[2014-06-23].http://qz.com/131436/contrary-to-what-youveheard-android-is-almost-impenetrable-to-malware/. 被引量:1
  • 2Zhou Y,Jiang X.An analysis of the AnserverBot trojan[EB/OL].[2014-06-23].http://www.csc.ncsu.edu/faculty/jiang/pubs/AnserverBot_Analysis.pdf. 被引量:1
  • 3F-Secure’s Security Labs.Trojan:Android/BaseBridge.A[EB/OL].[2014-06-23].http://www.fsecure.com/v-descs/trojan_android_basebridge.shtml. 被引量:1
  • 4F-Secure’s Security Labs.Droid KungFu Utilizes an Update Attack[EB/OL].(2011-10-05)[2014-06-23].http://www.f-secure.com/weblog/archives/00002259.html. 被引量:1
  • 5Jiang X X.Security Alert:New Stealthy Android Spyware-Plankton-Found in Official Android Market[EB/OL].[2014-06-23].http://www.csc.ncsu.edu/faculty/jiang/Plankton/. 被引量:1
  • 6Goegre code.Asroot[EB/OL].[2012-02-07].http://code.google.com/p/flashrec/source/browse/#svn%2Ftrunk%2Fandroid-root. 被引量:1
  • 7SEBASTIAN.Android trickery[EB/OL].[2014-06-23].http://c-skills.blogspot.com/2010/07/androidtrickery.html. 被引量:1
  • 8SEBASTIAN.Droid2[EB/OL].[2014-06-23].http://c-skills.blogspot.com/2010/08/droid2.html. 被引量:1
  • 9SEBASTIAN.Zimperlich sources[EB/OL].[2014-06-23].http://c-skills.blogspot.com/2011/02/zimperlich-sources.html. 被引量:1
  • 10SEBASTIAN.adb trickery#2[EB/OL].[2014-06-23].http://c-skills.blogspot.com/2011/01/adbtrickery-again.html. 被引量:1

共引文献156

同被引文献37

引证文献6

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部