Computer Science ›› 2022, Vol. 49 ›› Issue (6A): 508-515.doi: 10.11896/jsjkx.210700103

• Information Security • Previous Articles     Next Articles

Android Malware Detection Method Based on Heterogeneous Model Fusion

YAO Ye, ZHU Yi-an, QIAN Liang, JIA Yao, ZHANG Li-xiang, LIU Rui-liang   

  1. School of Computer Science,Northwestern Polytechnical University,Xi'an 710129,China
  • Online:2022-06-10 Published:2022-06-08
  • About author:YAO Ye,born in 1972,associate professor,master supervisor.His main research interests include software security testing,network system security evaluation,industrial Internet and security technology.
    ZHU Yi-an,born in 1961,professor,doctoral supervisor.His main research interests include parallel computing,network and information security,complex system modeling and analysis,big data intelligent processing technology,security critical operating system.
  • Supported by:
    National key Research and Development Program of China(2020YFB1712200),Key Research Development Plan of Shaanxi Province of China(2019ZDLGY12-07),Xi'an City Science and Technology Plan Project of China(GXYD192.1),Innovation Leading Project of Taicang City of China (TC2019DYDS06) and Dongguan City Science and Technology Equipment Mobilization Project of China(KZ2018-14).

Abstract: Aiming at the problem of limited detection accuracy of a single classification model,this paper proposes an Android malware detection method based on heterogeneous model fusion.Firstly,by identifying and collecting the mixed feature information of malicious software,the random forest algorithm based on CART decision tree and the Adaboost algorithm based on MLP are used to construct the integrated learning model respectively,and then the two classifiers are fused by Blending algorithm.Finally,a heterogeneous model fusion classifier is obtained.On this basis,the mobile terminal malware detection is implemented.Experimental results show that the proposed method can effectively overcome the problem of insufficient accuracy of single classification model.

Key words: Android system, Machine learning, Malware, Mobile terminal, Model fusion

CLC Number: 

  • TP391.9
[1] China Internet Network Information Center.The 46th 《Statistical Reports on Internet Development in China》[EB/OL].http://www.gov.cn/xinwen/2020-09/29/content_5548176.htm.
[2] 360 Beacon Lab,360 Security Brain.2019 Android Malware Special Report [EB/OL].https://blogs.360.cn/post/review android_malware_of_2019.html.
[3] China Academy of Information and Communications Technology.White Paper on Mobile Application (App) Data Security and Personal Information Protection (2019) [EB/OL].http://www.caict.ac.cn/kxyj/qwfb/bps/201912/t20191229_272847.htm.
[4] Network and Information Technology Center.Information Security Technology Personal Information Security Specification (2020 Edition) [EB/OL]. http://www.ahstu.edu.cn/wlzx/info/1011/1478.htm.
[5] National Engineering Laboratory,China Academy of Informa-tion and Communications Technology,iJiami.National Mobile App Risk Monitoring and Evaluation Report (2020 3rd Quarter Edition)[EB/OL].https://www.anquanke.com/post/id/219502.
[6] SHEN F,VECCHIO J D,MOHAISEN A,et al.Android Malware Detection Using Complex-Flows[C]//IEEE Transactions on Mobile Computing.2017.
[7] ZHANG C,HU G,WANG Z,et al.A NOVEL SVM-BASED DETECTION METHOD FOR ANDROID MALWARE[J].Computer Applications and Software,2018,35(10):298-304.
[8] LI C F ,LEE W L,SUN W.Android Malware Detection Algorithm Based on CNN and Naive Bayesian Method[J].Journal of Information Security Research,2019,5(6):470-476.
[9] WANG W,LI Y,WANG X,et al.Detecting android malicious apps and categorizing benign apps with ensemble of classifiers[J].Future Generation Computer Systems,2018,78:987-994.
[10] Android Developers.Motion Event [EB/OL].https://develo-per.android.com/reference/android/view/MotionEvent#getAction%28%29.
[11] GREGORUTTI B ,MICHEL B ,SAINT-PIERRE P.Correlation and variable importance in random forests[J].Stats & Computing,2017,27(3):659-678.
[12] SIKORA R ,AL-LAYMOUN O H.A Modified Stacking En-semble Machine Learning Algorithm Using Genetic Algorithms[J/OL].https://www.igi-global.com/Files/Ancillary/7a51f757-7e8d-4feb-8afd-2d16a8257b18_TOC.pdf.
[13] DONG K Y.Research and implementation of Android malware detection method[D].Nanjing:Nanjing University of Science and Technology,2018.
[14] DU W,LI J.Android malware detection and malicious behavior analysis based on semi-supervised learning[J].Journal of Information Security Research,2018,4(3):242-250.
[15] QIU H J,LIAN G X,LIU Z J.Android malware detection based on combined machine learning algorithm[J].Journal of Information Technology,2019(7):59-64.
[16] WANG T,LI J.Design and implementation of Android malware detection based on deep learning[J].Journal of Information Security Research,2018,4(2):140-144.
[17] JIANG C.Research on Android malware detection technologybased on deep learning [D].Changsha:Hunan University.
[18] HOU L Y,LUO L L,PAN L M,et al.Android Malware Detection Method Fusion Multi-feature[J].Chinese Journal of Network and Information Security,2020(1):67-74.
[19] WANG G Y.Research on Android malware detection method based on multi-features [D].Xi'an:Xidian University,2020.
[20] SONG L.Research on Android Local Layer Code Obfuscation Analysis Based on Machine Learning [D].Xi'an:Northwest University,2019.
[21] WANG X.Research and implementation of Android mobile terminal data security protection technology [D].Beijing:Beijing University of Posts and Telecommunications,2019.
[22] XU H.Research on Malware Detection Technology Based on Recurrent Neural Network [D].Beijing:Beijing University of Posts and Telecommunications,2016.
[23] ALZAYLAEE M K,YERIMA S Y,SEZER S.DL-Droid:Deep learning based android malware detection using real devices[J].Computers & Security,2020,89(2):101663.1-101663.11.
[24] JIANG F S.Research and implementation of malware identification based on deep learning [D].Beijing:Beijing University of Posts and Telecommunications,2019.
[25] YAN B.Research on Android malware detection technologybased on multi-model fusion [D].Xi'an:Xidian University,2019.
[26] MILOSEVIC N, DEHGHANTANHA A, CHOO K K R. Machine learning aided Android malware classification[J]. Compu-ters & Electrical Engineering,2017,61:266-227.
[1] LENG Dian-dian, DU Peng, CHEN Jian-ting, XIANG Yang. Automated Container Terminal Oriented Travel Time Estimation of AGV [J]. Computer Science, 2022, 49(9): 208-214.
[2] NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296.
[3] HE Qiang, YIN Zhen-yu, HUANG Min, WANG Xing-wei, WANG Yuan-tian, CUI Shuo, ZHAO Yong. Survey of Influence Analysis of Evolutionary Network Based on Big Data [J]. Computer Science, 2022, 49(8): 1-11.
[4] LI Yao, LI Tao, LI Qi-fan, LIANG Jia-rui, Ibegbu Nnamdi JULIAN, CHEN Jun-jie, GUO Hao. Construction and Multi-feature Fusion Classification Research Based on Multi-scale Sparse Brain Functional Hyper-network [J]. Computer Science, 2022, 49(8): 257-266.
[5] ZHANG Guang-hua, GAO Tian-jiao, CHEN Zhen-guo, YU Nai-wen. Study on Malware Classification Based on N-Gram Static Analysis Technology [J]. Computer Science, 2022, 49(8): 336-343.
[6] YU Bin, LI Xue-hua, PAN Chun-yu, LI Na. Edge-Cloud Collaborative Resource Allocation Algorithm Based on Deep Reinforcement Learning [J]. Computer Science, 2022, 49(7): 248-253.
[7] CHEN Ming-xin, ZHANG Jun-bo, LI Tian-rui. Survey on Attacks and Defenses in Federated Learning [J]. Computer Science, 2022, 49(7): 310-323.
[8] WANG Jun-feng, LIU Fan, YANG Sai, LYU Tan-yue, CHEN Zhi-yu, XU Feng. Dam Crack Detection Based on Multi-source Transfer Learning [J]. Computer Science, 2022, 49(6A): 319-324.
[9] WANG Fei, HUANG Tao, YANG Ye. Study on Machine Learning Algorithms for Life Prediction of IGBT Devices Based on Stacking Multi-model Fusion [J]. Computer Science, 2022, 49(6A): 784-789.
[10] LI Ya-ru, ZHANG Yu-lai, WANG Jia-chen. Survey on Bayesian Optimization Methods for Hyper-parameter Tuning [J]. Computer Science, 2022, 49(6A): 86-92.
[11] ZHAO Lu, YUAN Li-ming, HAO Kun. Review of Multi-instance Learning Algorithms [J]. Computer Science, 2022, 49(6A): 93-99.
[12] XIAO Zhi-hong, HAN Ye-tong, ZOU Yong-pan. Study on Activity Recognition Based on Multi-source Data and Logical Reasoning [J]. Computer Science, 2022, 49(6A): 397-406.
[13] XU Jie, ZHU Yu-kun, XING Chun-xiao. Application of Machine Learning in Financial Asset Pricing:A Review [J]. Computer Science, 2022, 49(6): 276-286.
[14] YAO Xiao-ming, DING Shi-chang, ZHAO Tao, HUANG Hong, LUO Jar-der, FU Xiao-ming. Big Data-driven Based Socioeconomic Status Analysis:A Survey [J]. Computer Science, 2022, 49(4): 80-87.
[15] LI Ye, CHEN Song-can. Physics-informed Neural Networks:Recent Advances and Prospects [J]. Computer Science, 2022, 49(4): 254-262.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!