Back to Search Start Over

Detection of malware applications from centrality measures of syscall graph.

Authors :
Surendran, Roopak
Thomas, Tony
Source :
Concurrency & Computation: Practice & Experience; May2022, Vol. 34 Issue 10, p1-14, 14p
Publication Year :
2022

Abstract

These days it is found that malware authors tend to create new variants of existing Android malware by using various kinds of obfuscation techniques. These kinds of obfuscated malware applications can bypass all the current antimalware products which rely on static analysis techniques to detect the malicious behavior. Hence, it is essential to develop innovative dynamic analysis mechanisms for Android malware detection. It is known that, the malicious behavior of statically obfuscated malware applications can get reflected in the system call (syscall) trace generated by them. Most of the existing syscall based mechanisms depend only on the features derived from the syscall counts for malware detection. These syscall count related features are inadequate to capture many other useful characteristics related to the syscalls in a sequence. In order to overcome this limitation, we modeled the syscall trace of an application as an ordered graph which enabled to infer various kinds of features in the form of centrality measures related to that syscall trace of the application. Then, these centrality measures are fed to an ML model to predict the malicious behavior. From the implementation results, we found that our mechanism can detect malware apps with an accuracy of 0.99. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
15320626
Volume :
34
Issue :
10
Database :
Complementary Index
Journal :
Concurrency & Computation: Practice & Experience
Publication Type :
Academic Journal
Accession number :
156195003
Full Text :
https://doi.org/10.1002/cpe.6835