Computer Science ›› 2020, Vol. 47 ›› Issue (4): 298-304.doi: 10.11896/jsjkx.190700132

• Information Security • Previous Articles     Next Articles

Android Malware Detection Method Based on Deep Autoencoder Network

SUN Zhi-qiang, WAN Liang, DING Hong-wei   

  1. School of Computer Science and Technology,Guizhou University,Guiyang 550025,China;
    Institute of Computer Software and Theory,Guizhou University,Guiyang 550025,China
  • Received:2019-07-19 Online:2020-04-15 Published:2020-04-15
  • Contact: WAN Liang,born in 1974,Ph.D,professor,is a member of China Computer Federation.His main research interests include information security,network security and deep learning.
  • About author:SUN Zhi-qiang,born in 1995,postgra-duate,is a member of China Computer Federation.His main research interests include malware detection,information security and deep learning.
  • Supported by:
    This work was supported by the Guizhou Provincial Science Fund LH Word (7634)

Abstract: To solve the problem of low detection rate of traditional Android malware detection methods,an Android malware detection method based on deep contractive denoising autoencoder network (DCDAN) was proposed.Firstly,the APK file is analyzed in reverse to obtain seven kinds of information in the APK file,such as permissions,sensitive API in the file,which are taken as feature attributes.Then,the feature attributes are taken as the input of the deep contractive denoising autoencoder network,train each contractive denoising autoencoder network is trined layer by layer from bottom to top by using greedy algorithm,and the The deep contractive denoising autoencoder network completed by training is used to extract the information of the original features to obtain the optimal low-dimensional representation.Finally,the back propagation algorithm is used to train and classify the acquired low-dimensional representations to realize the detection of Android malware.Adding noise to the input data of the deep autoencoder network makes the reconstructed data more robust,and adding jacobian matrix as penalty term enhances the anti-disturbance ability of the deep autoencoder network.The experimental results verify the feasibility and high efficiency of this method.Compared with the traditional detection method,the detection method can improve the accuracy of malware detection and reduce the false alarm rate effectively.

Key words: Android malware, Back propagation algorithm, Deep contractive denoising autoencoder network, Greedy algorithm, Jacobian matrix

CLC Number: 

  • TP309
[1]QING S H.Research Progress on Android Security [J].Journal of Software,2016,27(1):45-71.
[2]VINOD P,AKKA Z,MAURO C.A machine learning based approach to detect malicious android apps using discriminant system calls[J].Future Generation Computer Systems,2019,94:333-350.
[3]HE G F,XU B F,ZHU H T.AppFA:A Novel Approach to Detect Malicious Android Applications on the Network[J].Security and Communication Networks,2018,2018(4):1-15.
[4]SAPNA M,KIRAN K.Malicious Application Detection andClassification System for Android Mobiles[J].International Journal of Ambient Computing and Intelligence,2018,9:95-114.
[5]MARIOS A,NICOLA D,ANGELO S.Analysis and Evaluation of SafeDroid v2.0,a Framework for Detecting Malicious Android Applications[J].Security and Communication Networks,2018(1):1-15.
[6]WANG W,LI Y Y,WANG X,et al.Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers[J].Future Generation Computer Systems,2018,78(3):987-994.
[7]JUERGEN S.Deep Learning in Neural Networks:An Overview[J].Neural Networks,2015,61:85-117.
[8]PRASHANT K,PANKAJ K.A Novel Approach for Detecting Malware in Android Applications Using Deep Learning[C]//2018 Eleventh International Conference on Contemporary Computing(IC3).IEEE Computer Society,2018,1:1-4.
[9]LI D F,WANG Z G,XUE Y B.Fine-grained Android Malware Detection based on Deep Learning[C]//2018 IEEE Conference on Communications and Network Security(CNS).Beijing:IEEE,2018:1-2.
[1] ZHANG Chong-yu, CHEN Yan-ming, LI Wei. Task Offloading Online Algorithm for Data Stream Edge Computing [J]. Computer Science, 2022, 49(7): 263-270.
[2] LIU Zhang-hui, ZHENG Hong-qiang, ZHANG Jian-shan, CHEN Zhe-yi. Computation Offloading and Deployment Optimization in Multi-UAV-Enabled Mobile Edge Computing Systems [J]. Computer Science, 2022, 49(6A): 619-627.
[3] ZHANG Xin-ming, LI Shuang-qian, LIU Yan, MAO Wen-tao, LIU Shang-wang, LIU Guo-qi. Coyote Optimization Algorithm Based on Information Sharing and Static Greed Selection [J]. Computer Science, 2020, 47(5): 217-224.
[4] HU Jun-qin, ZHANG Jia-jun, HUANG Yin-hao, CHEN Xing, LIN Bing. Computation Offloading Scheduling Technology for DNN Applications in Edge Environment [J]. Computer Science, 2020, 47(10): 247-255.
[5] LIAO Yong, YANG Xin-yi, XIA Mao-han, WANG Bo, LI Shou-zhi, SHEN Xuan-fan. Improved Tomlinson-Harashima Precoding Based on Greedy Algorithm in High-speed Mobile Scenarios [J]. Computer Science, 2019, 46(8): 121-126.
[6] LI Zhuo, XU Zhe, CHEN Xin, LI Shu-qin. Location-related Online Multi-task Assignment Algorithm for Mobile Crowd Sensing [J]. Computer Science, 2019, 46(6): 102-106.
[7] ZHENG Fei-feng, JIANG Juan, MEI Qi-huang. Study on Stowage Optimization in Minimum Container Transportation Cost [J]. Computer Science, 2019, 46(6): 239-245.
[8] XIE Nian-nian, ZENG Fan-ping, ZHOU Ming-song, QIN Xiao-xia, LV Cheng-cheng, CHEN Zhao. Android Malware Detection with Multi-dimensional Sensitive Features [J]. Computer Science, 2019, 46(2): 95-101.
[9] YU Jian-jun, WU Chun-ming. Offline Static Virtual Network Mapping Algorithm Based on Tabu Search Genetic Optimization [J]. Computer Science, 2019, 46(12): 114-119.
[10] CHEN Jin-yin, HU Ke-ke,LI Yu-wei. Research on UAV Multi-point Navigation Algorithm Based on MB-RRT* [J]. Computer Science, 2018, 45(6A): 85-90.
[11] ZHU Rui-chao,QIAN Wen-hua,PU Yuan-yuan, XU Dan. Texture Synthesis Based on Self-similarity Matching [J]. Computer Science, 2018, 45(6A): 215-219.
[12] HU Qing-cheng, ZHANG Yong, XING Chun-xiao. K-clique Heuristic Algorithm for Influence Maximization in Social Network [J]. Computer Science, 2018, 45(6): 32-35.
[13] DU Xiu-li, GU Bin-bin, HU Xing, QIU Shao-ming and CHEN Bo. Support Similarity between Lines Based CoSaMP Algorithm for Image Reconstruction [J]. Computer Science, 2018, 45(4): 306-311.
[14] NING Zhuo, SHAO Da-cheng, CHEN Yong and SUN Zhi-xin. Android Static Analysis System Based on Signature and Data Flow Pattern Mining [J]. Computer Science, 2017, 44(Z11): 317-321.
[15] SUN Tao and ZHU Xiao-ming. Computing Longest Common Subsequences Approximately Based on Lattice [J]. Computer Science, 2017, 44(2): 270-274.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!