Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 421-427.

• Information Security • Previous Articles     Next Articles

Android Malicious Application Detection Based on Improved Artificial Bee Colony Algorithms

XU Kai-yong, XIAO Jing-xu, GUO Song, DAI Le-yu, DUAN Jia-liang   

  1. (Country Network Space Security Teaching and Research Room (Information Engineering University),Zhengzhou 450001,China)
  • Online:2019-11-10 Published:2019-11-20

Abstract: With the rapid development of the Internet and mobile terminals,there are a lot of important information stored in mobile phones.An important way to ensure that these information is not compromised is to detect and process malicious applications in mobile phones.Before detecting malicious applications,feature extraction is required for samples,and how to effectively select features among many features is a crucial process in malicious application detection.Based on the application of Android platform,this paper established an Android malicious application detection model based on the improved artificial bee colony algorithm.By effectively selecting the features,the feature combination that optimizes the classification results is finally obtained,thereby improving the detection performance of Android malicious application detection.The Android application features are extracted under static and dynamic conditions respectively.The malicious application detection model is tested by various classification algorithms.It is proved that the proposed malicious malicious detection method based on the improved artificial bee colony algorithm has the feasibility and superiority.

Key words: Artificial bee colony classification, Feature optimization, Feature selection, Malicious application detection

CLC Number: 

  • TP311
[1]Mobile Operating System Market Share Worldwide[OL].http://gs.statcounter.com/os-market-share.
[2]Google Play[OL].https://play.google.com.
[3]《2018年Android恶意软件专题报告》[OL].https://www.anquanke.com/post/id/171110.
[4]QIN Z Y,WANG Z Y,WU F B,et al.Android malware detection based on multi-level signature matching[J].Application Research of Computers,2016,33(3):891-895.
[5]NING Z,SHAO D C,et al.Android Static Analysis Based on Signature and Data Flow Pattern Mining[J].Computer Science,2017,44(S2).
[6]YANG H,ZHANG Y Q,HU Y P,et al.Android malware detection method based on permission sequential pattern mining algorithm[J].Journal on Communications,2017,34(S1):106-115.
[7]NAVARRO L C, NAVARRO A K W,GRÉGIO A,et al.Leveraging Ontologies and Machine-learning Techniques for Malware Analysis into Android Permissions Ecosystems[J].Computers & Security,2018,78:429-453.
[8]KABAKUS A T,DOGRU I A.An in-depth analysis of Android malware using hybrid techniques[J].Digital Investigation,2018,24(3):25-33.
[9]YANG H,ZHANG Y Q,HU Y P,et al.Malware Behavior Detection System of Android Applications Based on Multi-Class Features[J].Chinese Journal of Computers,2014,37(1):15-27.
[10]马建光,姜巍.大数据的概念,特征及其应用[J].国防科技,2013(2):10-17.
[11]ENCK W,GILBERT P,HAN S,et al.TaintDroid:an information-flow tracking system for realtime privacy monitoring on smartphones[J].ACM Transactions on Computer Systems (TOCS),2014,32(2):5.
[12]Android SDK[OL].https://android-sdk.en.softonic.com.
[13]Androlyze.py的使用方法[OL].https://blog.csdn.net/u013107656/article/details/51790153.
[14]APImonitor-DroidBox的原理分析[OL].https://code.google.com/p/droidbox/wiki/APIMonitor.
[15]AKBARI R,HEDAYATZADEH R,ZIARATI K,et al.Amulti-objective artificial bee colony algorithm[J].Swarm and Evolutionary Computation,2012,2:39-52. [16]PALANISAMY S,KANMANI S.Artificial bee colony approach for optimizing feature selection[J].International Journal of Computer Science Issues (IJCSI),2012,9(3):432.
[17]HANCER E,XUE B,ZHANG M,et al.Paretofront feature selection based on artificial bee colony optimization[J].Information Sciences,2018,422:462-479.
[18]YUAN Z,LU Y,XUE Y.Droiddetector:android malware characterization and detection using deep learning[J].清华大学学报自然科学版(英文版),2016,21(1):114-123.
[19]SARACINO A,SGANDURRA D,DINI G,et al.MADAM:Effective and Efficient Behavior-based Android Malware Detection and Prevention[C]∥IEEE Transactions on Dependable and Secure Computing.2016.
[20]HANCER E,XUE B,ZHANG M,et al.Pareto front feature selection based on artificial bee colony optimization[J].Information Sciences,2018,422:462-479.
[1] LI Bin, WAN Yuan. Unsupervised Multi-view Feature Selection Based on Similarity Matrix Learning and Matrix Alignment [J]. Computer Science, 2022, 49(8): 86-96.
[2] HU Yan-yu, ZHAO Long, DONG Xiang-jun. Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification [J]. Computer Science, 2022, 49(7): 73-78.
[3] KANG Yan, WANG Hai-ning, TAO Liu, YANG Hai-xiao, YANG Xue-kun, WANG Fei, LI Hao. Hybrid Improved Flower Pollination Algorithm and Gray Wolf Algorithm for Feature Selection [J]. Computer Science, 2022, 49(6A): 125-132.
[4] CHU An-qi, DING Zhi-jun. Application of Gray Wolf Optimization Algorithm on Synchronous Processing of Sample Equalization and Feature Selection in Credit Evaluation [J]. Computer Science, 2022, 49(4): 134-139.
[5] SUN Lin, HUANG Miao-miao, XU Jiu-cheng. Weak Label Feature Selection Method Based on Neighborhood Rough Sets and Relief [J]. Computer Science, 2022, 49(4): 152-160.
[6] LI Zong-ran, CHEN XIU-Hong, LU Yun, SHAO Zheng-yi. Robust Joint Sparse Uncorrelated Regression [J]. Computer Science, 2022, 49(2): 191-197.
[7] WU Lin, BAI Lan, SUN Meng-wei, GOU Zheng-wei. Algal Bloom Discrimination Method Using SAR Image Based on Feature Optimization Algorithm [J]. Computer Science, 2021, 48(9): 194-199.
[8] ZHANG Ye, LI Zhi-hua, WANG Chang-jie. Kernel Density Estimation-based Lightweight IoT Anomaly Traffic Detection Method [J]. Computer Science, 2021, 48(9): 337-344.
[9] YANG Lei, JIANG Ai-lian, QIANG Yan. Structure Preserving Unsupervised Feature Selection Based on Autoencoder and Manifold Regularization [J]. Computer Science, 2021, 48(8): 53-59.
[10] HOU Chun-ping, ZHAO Chun-yue, WANG Zhi-peng. Video Abnormal Event Detection Algorithm Based on Self-feedback Optimal Subclass Mining [J]. Computer Science, 2021, 48(7): 199-205.
[11] HU Yan-mei, YANG Bo, DUO Bin. Logistic Regression with Regularization Based on Network Structure [J]. Computer Science, 2021, 48(7): 281-291.
[12] ZHOU Gang, GUO Fu-liang. Research on Ensemble Learning Method Based on Feature Selection for High-dimensional Data [J]. Computer Science, 2021, 48(6A): 250-254.
[13] DING Si-fan, WANG Feng, WEI Wei. Relief Feature Selection Algorithm Based on Label Correlation [J]. Computer Science, 2021, 48(4): 91-96.
[14] TENG Jun-yuan, GAO Meng, ZHENG Xiao-meng, JIANG Yun-song. Noise Tolerable Feature Selection Method for Software Defect Prediction [J]. Computer Science, 2021, 48(12): 131-139.
[15] ZHANG Ya-chuan, LI Hao, SONG Chen-ming, BU Rong-jing, WANG Hai-ning, KANG Yan. Hybrid Artificial Chemical Reaction Optimization with Wolf Colony Algorithm for Feature Selection [J]. Computer Science, 2021, 48(11A): 93-101.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!