Back to Search
Start Over
Detection of malware applications from centrality measures of syscall graph.
- Source :
- Concurrency & Computation: Practice & Experience; May2022, Vol. 34 Issue 10, p1-14, 14p
- Publication Year :
- 2022
-
Abstract
- These days it is found that malware authors tend to create new variants of existing Android malware by using various kinds of obfuscation techniques. These kinds of obfuscated malware applications can bypass all the current antimalware products which rely on static analysis techniques to detect the malicious behavior. Hence, it is essential to develop innovative dynamic analysis mechanisms for Android malware detection. It is known that, the malicious behavior of statically obfuscated malware applications can get reflected in the system call (syscall) trace generated by them. Most of the existing syscall based mechanisms depend only on the features derived from the syscall counts for malware detection. These syscall count related features are inadequate to capture many other useful characteristics related to the syscalls in a sequence. In order to overcome this limitation, we modeled the syscall trace of an application as an ordered graph which enabled to infer various kinds of features in the form of centrality measures related to that syscall trace of the application. Then, these centrality measures are fed to an ML model to predict the malicious behavior. From the implementation results, we found that our mechanism can detect malware apps with an accuracy of 0.99. [ABSTRACT FROM AUTHOR]
- Subjects :
- CENTRALITY
ANTI-malware (Computer software)
GRAPH algorithms
MALWARE
MOBILE apps
Subjects
Details
- Language :
- English
- ISSN :
- 15320626
- Volume :
- 34
- Issue :
- 10
- Database :
- Complementary Index
- Journal :
- Concurrency & Computation: Practice & Experience
- Publication Type :
- Academic Journal
- Accession number :
- 156195003
- Full Text :
- https://doi.org/10.1002/cpe.6835