hybrid-Flacon: Hybrid Pattern Malware Detection and Categorization with Network Traffic andProgram Code

12/19/2021
by   Peng Xu, et al.
0

Nowadays, Android is the most dominant operating system in the mobile ecosystem, with billions of people using its apps daily. As expected, this trend did not go unnoticed by miscreants, and Android became the favorite platform for discovering new victims through malicious apps. Moreover, these apps have become so sophisticated that they can bypass anti-malware measures to protect the users. Therefore, it is safe to admit that traditional anti-malware techniques have become cumbersome, sparking the urge to develop an efficient way to detect Android malware. This paper presents hybrid-Flacon, a hybrid pattern Android malware detection and categorization framework. It combines dynamic and static features of Android malware, which are from network traffic and code graph structure. In hybrid-Flacon, we treat network traffic as a dynamic feature and process it as a 2D image sequence. Meanwhile, hybrid-Flacon handles each network flow in the packet as a 2D image and uses a bidirectional LSTM network to process those 2D-image sequences to obtain vectors representing network packets. We use the program code graph for a static feature and introduce natural language processing (NLP) inspired techniques on function call graph (FCG). We design a graph neural network-based approach to convert the whole graph structure of Android apps to vectors. Finally, We utilize those converted vectors, both network and program code features, and concatenate them to detect and categorize the malware. Our results reveal that hybrid-Flacon yields better results as we get 97.16 accuracy for malware categorization. Additionally, we release a dataset AndroNetMnist, which converts the network traffic to a 2D-image sequence and helps to accomplish malware detection on a 2D-image sequence.

READ FULL TEXT

page 1

page 4

research
12/19/2021

Android-COCO: Android Malware Detection with Graph Neural Network for Byte- and Native-Code

With the popularity of Android growing exponentially, the amount of malw...
research
05/12/2017

R2-D2: ColoR-inspired Convolutional NeuRal Network (CNN)-based AndroiD Malware Detections

Machine Learning (ML) has found it particularly useful in malware detect...
research
05/27/2021

Resilient and Adaptive Framework for Large Scale Android Malware Fingerprinting using Deep Learning and NLP Techniques

Android malware detection is a significat problem that affects billions ...
research
06/04/2020

Automatic Feature Extraction, Categorization and Detection of Malicious Code in Android Applications

Since Android has become a popular software platform for mobile devices ...
research
04/08/2021

Characterization of Android malware based on subgraph isomorphism

The Android operating system is the most spread mobile platform in the w...
research
04/08/2021

Characterization of Android malware based on opcode analysis

The Android operating system is the most spread mobile platform in the w...
research
11/20/2017

AndroVault: Constructing Knowledge Graph from Millions of Android Apps for Automated Analysis

Data driven research on Android has gained a great momentum these years....

Please sign up or login with your details

Forgot password? Click here to reset