期刊文献+

基于非常规特征的Android恶意软件检测方法

Android Malware Detection Method Based on Unconventional Features
下载PDF
导出
摘要 针对现有方法特征提取较为雷同,涉及文件较单一的不足,提出一种基于非常规特征的Android恶意软件检测方法。首先,提出新的文件熵、界面布局和方法指令特征,然后,结合随机森林算法分别进行单一和组合特征检测实验。最后分析实验结果,验证该特征的有效性与可行性,其单一检测准确率比传统的Intents特征和统计学特征效果平均提高8%,训练效率提升近50%,与传统表征效果更好的权限特征组合使用效果更佳,可比单一检测准确率提升近10%。该方法从非常规特征的角度为恶意软件的检测提供了新思路。 Aiming at the disadvantages of the existing methods, which have similar feature extraction and involve single file, proposes a new method of detecting Android malware based on unconventional features. Firstly, proposes a new document entropy, interface layout and method in. struction feature. Then, carries out the single and combined feature detection experiments with random forest algorithm. Finally, analyzes the experimental results to verify the validity and feasibility of the feature. The single detection accuracy is about 8% higher than the tradi. tional Intents feature and statistical feature, and the training efficiency is nearly 50%. The combination of the permission features with the traditional representation is better, and the accuracy is nearly 10% higher than that of the single detection. This method provides a new idea for malware detection from the perspective of unconventional features.
作者 鲁倩 吴向前 LU Qian;WU Xiang-qiang(College of Information Science and Engineering, Xinjiang University, Urumqi 830046;Network Center, Xinjiang University, Urumqi 830046)
出处 《现代计算机》 2019年第16期65-69,95,共6页 Modern Computer
基金 新疆维吾尔自治区重大专项基金(No.2017B01006-4)
关键词 ANDROID 文件熵 界面布局 方法指令 随机森林算法 恶意软件检测 非常规特征 Android File Entropy Layout Method Instruction Random Forest Malware Detection Unconventional Features
  • 相关文献

参考文献2

二级参考文献18

  • 1杨欢,张玉清,胡予濮,刘奇旭.基于权限频繁模式挖掘算法的Android恶意应用检测方法[J].通信学报,2013,34(S1):106-115. 被引量:47
  • 2Xiaoyun Wang,Hongbo Yu.How to break MD5 and other hash functions[DB/OL].In EUROCRYPT,2005,http://www.infosec.sdu.edu.cn/paper/md5attack.pdf. 被引量:1
  • 3Sasaki Y,Wang L.Security of MD5 Challenge and Response:Extension of APOP Password Recovery Attack[DB/OL].CT-RSA 2008,LNCS 4964:1-18. 被引量:1
  • 4Stevens M,Sotirov A.Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate[DB/OL].Cryptology ePrint Archive,Report,2009. 被引量:1
  • 5Bai H H.The Study of Quick MD5 Collision Algorithms[D].Zhejiang University,2010. 被引量:1
  • 6Tao Xie,Fanbao Liu,Dengguo Feng.Could The 1-MSB Input Difference Be The Fastest Collision Attack For MD5[DB/OL].Cryptology ePrint Archive,Report 2008.http://eprint.iacr.org/. 被引量:1
  • 7Xiaoyun Wang,Xuejia Lai,et al.Collisions for hash functions MD4,MD5,HAVAL-128 and RIPEMD[DB/OL].Cryptology ePrint Archive,Report 2004.http://eprint.iacr.org/2004/199. 被引量:1
  • 8Marc Stevens,Arjen Lenstra,Benne de Weger.Chosen-prefix collisions for MD5 and colliding X.509 certificates for different identities[J].EUROCRYPT 2007,LNCS,Springer,2007,45(15):1-22. 被引量:1
  • 9刘凡保,谢涛.MD5碰撞攻击的差分路径构建[C].第八届全国信息隐藏与多媒体安全学术大会湖南省计算机学会第十一届学术年会论文集,2009. 被引量:1
  • 10毛明,秦志光,陈少晖.破译MD5算法关键技术探索[J].计算机应用,2009,29(12):3174-3177. 被引量:7

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部