Android Malware Detection using Markov Chain Model of Application Behaviors in Requesting System Services

11/15/2017
by   Majid Salehi, et al.
0

Widespread growth in Android malwares stimulates security researchers to propose different methods for analyzing and detecting malicious behaviors in applications. Nevertheless, current solutions are ill-suited to extract the fine-grained behavior of Android applications accurately and efficiently. In this paper, we propose ServiceMonitor, a lightweight host-based detection system that dynamically detects malicious applications directly on mobile devices. ServiceMonitor reconstructs the fine-grained behavior of applications based on a novel systematic system service use analysis technique. Using proposed system service use perspective enables us to build a statistical Markov chain model to represent what and how system services are used to access system resources. Afterwards, we consider built Markov chain in the form of a feature vector and use it to classify the application behavior into either malicious or benign using Random Forests classification algorithm. ServiceMonitor outperforms current host-based solutions with evaluating it against 4034 malwares and 10024 benign applications and obtaining 96% of accuracy rate and negligible overhead and performance penalty.

READ FULL TEXT
research
03/02/2019

Detecting and Classifying Android Malware using Static Analysis along with Creator Information

Thousands of malicious applications targeting mobile devices, including ...
research
02/10/2020

Droidetec: Android Malware Detection and Malicious Code Localization through Deep Learning

Android malware detection is a critical step towards building a security...
research
06/13/2018

Android Malware Detection using Large-scale Network Representation Learning

With the growth of mobile devices and applications, the number of malici...
research
11/20/2022

Mask Off: Analytic-based Malware Detection By Transfer Learning and Model Personalization

The vulnerability of smartphones to cyberattacks has been a severe conce...
research
01/21/2019

Virtually the Same: Comparing Physical and Virtual Testbeds

Network designers, planners, and security professionals increasingly rel...
research
03/12/2019

Are cracked applications really free? An empirical analysis on Android devices

Android is among the popular platforms running on millions of smart devi...
research
10/12/2021

Exploiting Sensor Multiplexing for Covert Channels and Application Fingerprinting on Mobile Devices

Mobile devices often distribute measurements from a single physical sens...

Please sign up or login with your details

Forgot password? Click here to reset