ANDROIDGYNY: Reviewing clustering techniques for Android malware family classification

نویسندگان

چکیده

Thousands of malicious applications (apps) are daily created, modified with the aid automation tools, and released on World Wide Web. Several techniques have been applied over years to identify whether an APK is or not. The use these intends unknown malware mainly by calculating similarity a sample previously grouped, already known families apps. Thus, high rates accuracy would enable several countermeasures: from further quick detection development vaccines for reverse engineering new variants. However, most literature consists limited experiments—either short-term offline based exclusively well-known apps’ families. In this paper, we explore phylogeny, term borrowed biology, consisting genealogical study relationship between elements Also, investigate clustering mobile classification discuss how researchers setting up their experiments.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ClusTheDroid: Clustering Android Malware

The volume of new Android malware is growing at an exponential pace. This cries for automated tools that can aid the malware analyst in dissecting the behaviours of new malicious applications. In this paper, we present ClusTheDroid, a system for clustering Android malware so as to identify malicious applications that exhibit similar behaviours. For this, ClusTheDroid extracts feature sets from ...

متن کامل

Random Forest Classification for Android Malware

Classification techniques such as Support Vector Machines, K-Nearest Neighbours, Decision Trees, Logistic Regression and Naive Bayes have widely been used in the area of intrusion detection research in the security community. They are predominantly used for behaviour based detection methods (anomaly detection methods). In this paper we exclusively apply the ensemble learning algorithm Random Fo...

متن کامل

Android Malware Clustering Through Malicious Payload Mining

Clustering has been well studied for desktop malware analysis as an effective triage method. Conventional similarity-based clustering techniques, however, cannot be immediately applied to Android malware analysis due to the excessive use of third-party libraries in Android application development and the widespread use of repackaging in malware development. We design and implement an Android ma...

متن کامل

Analysis of Bayesian classification-based approaches for Android malware detection

Mobile malware has been growing in scale and complexity spurred by the unabated uptake of smartphones worldwide. Android is fast becoming the most popular mobile platform resulting in sharp increase in malware targeting the platform. Additionally, Android malware is evolving rapidly to evade detection by traditional signature-based scanning. Despite current detection measures in place, timely d...

متن کامل

Comparing Stimulation Techniques for Detecting Android Piggybacked Malware

Context Android dominates the handheld devices market with more than 80% marketshare. Needless to say, such popularity encourages malware authors to write and distribute malicious applications (hereafter apps) that target Android devices. To smoothen the spread of their malicious apps, malware authors tend to design their instances to mimick the appearance and behavior of benign apps (e.g., gam...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Digital threats

سال: 2023

ISSN: ['2692-1626', '2576-5337']

DOI: https://doi.org/10.1145/3587471