• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于 Koodous 平台和机器学习的轻量级 Android 恶意软件设备端检测。

Lightweight On-Device Detection of Android Malware Based on the Koodous Platform and Machine Learning.

机构信息

NASK PIB, Kolska 12, 01-045 Warsaw, Poland.

出版信息

Sensors (Basel). 2022 Aug 31;22(17):6562. doi: 10.3390/s22176562.

DOI:10.3390/s22176562
PMID:36081020
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9460878/
Abstract

Currently, Android is the most popular operating system among mobile devices. However, as the number of devices with the Android operating system increases, so does the danger of using them. This is especially important as smartphones increasingly authenticate critical activities(e-banking, e-identity). BotSense Mobile is a tool already integrated with some critical applications (e-banking, e-identity) to increase user safety. In this paper, we focus on the novel functionality of BotSense Mobile: the detection of malware applications on a user device. In addition to the standard blacklist approach, we propose a machine learning-based model for unknown malicious application detection. The lightweight neural network model is deployed on an edge device to avoid sending sensitive user data outside the device. For the same reason, manifest-related features can be used by the detector only. We present a comprehensive empirical analysis of malware detection conducted on recent data (May-June, 2022) from the Koodous platform, which is a collaborative platform where over 70 million Android applications were collected. The research highlighted the problem of machine learning model aging. We evaluated the lightweight model on recent Koodous data and obtained f1=0.77 and high precision (0.9).

摘要

目前,Android 是移动设备中最受欢迎的操作系统。然而,随着使用 Android 操作系统的设备数量的增加,使用它们的危险也随之增加。这在智能手机越来越多地认证关键活动(电子银行、电子身份)时尤为重要。BotSense Mobile 是一种已经集成到一些关键应用程序(电子银行、电子身份)中的工具,以提高用户的安全性。在本文中,我们专注于 BotSense Mobile 的新功能:检测用户设备上的恶意软件应用程序。除了标准的黑名单方法外,我们还提出了一种基于机器学习的未知恶意应用程序检测模型。轻量级神经网络模型部署在边缘设备上,以避免将敏感用户数据发送到设备外部。出于同样的原因,检测器只能使用与清单相关的功能。我们对 Koodous 平台(一个协作平台,其中收集了超过 7000 万个 Android 应用程序)上最近的数据(2022 年 5 月至 6 月)进行了恶意软件检测的全面实证分析。该研究强调了机器学习模型老化的问题。我们在最近的 Koodous 数据上评估了轻量级模型,得到了 f1=0.77 和高精度(0.9)。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e873/9460878/4a16637b39d8/sensors-22-06562-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e873/9460878/47390347d959/sensors-22-06562-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e873/9460878/c6f932ff237f/sensors-22-06562-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e873/9460878/f5a6c615977e/sensors-22-06562-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e873/9460878/bf70fce12f7e/sensors-22-06562-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e873/9460878/49108df652d3/sensors-22-06562-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e873/9460878/97bbb45ae57c/sensors-22-06562-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e873/9460878/57fba9dc3d91/sensors-22-06562-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e873/9460878/acff12dddec3/sensors-22-06562-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e873/9460878/12a9b2c1a064/sensors-22-06562-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e873/9460878/9bbe5f824132/sensors-22-06562-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e873/9460878/1a428997b383/sensors-22-06562-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e873/9460878/b69fe69b300e/sensors-22-06562-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e873/9460878/4a16637b39d8/sensors-22-06562-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e873/9460878/47390347d959/sensors-22-06562-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e873/9460878/c6f932ff237f/sensors-22-06562-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e873/9460878/f5a6c615977e/sensors-22-06562-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e873/9460878/bf70fce12f7e/sensors-22-06562-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e873/9460878/49108df652d3/sensors-22-06562-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e873/9460878/97bbb45ae57c/sensors-22-06562-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e873/9460878/57fba9dc3d91/sensors-22-06562-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e873/9460878/acff12dddec3/sensors-22-06562-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e873/9460878/12a9b2c1a064/sensors-22-06562-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e873/9460878/9bbe5f824132/sensors-22-06562-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e873/9460878/1a428997b383/sensors-22-06562-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e873/9460878/b69fe69b300e/sensors-22-06562-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e873/9460878/4a16637b39d8/sensors-22-06562-g013.jpg

相似文献

1
Lightweight On-Device Detection of Android Malware Based on the Koodous Platform and Machine Learning.基于 Koodous 平台和机器学习的轻量级 Android 恶意软件设备端检测。
Sensors (Basel). 2022 Aug 31;22(17):6562. doi: 10.3390/s22176562.
2
Artificial Intelligence Algorithms for Malware Detection in Android-Operated Mobile Devices.人工智能算法在安卓操作系统移动设备中的恶意软件检测。
Sensors (Basel). 2022 Mar 15;22(6):2268. doi: 10.3390/s22062268.
3
AMDDLmodel: Android smartphones malware detection using deep learning model.AMDDL 模型:基于深度学习模型的安卓智能手机恶意软件检测。
PLoS One. 2024 Jan 19;19(1):e0296722. doi: 10.1371/journal.pone.0296722. eCollection 2024.
4
A detection method for android application security based on TF-IDF and machine learning.基于 TF-IDF 和机器学习的安卓应用安全检测方法。
PLoS One. 2020 Sep 11;15(9):e0238694. doi: 10.1371/journal.pone.0238694. eCollection 2020.
5
MFDroid: A Stacking Ensemble Learning Framework for Android Malware Detection.MFDroid:一种用于 Android 恶意软件检测的堆叠集成学习框架。
Sensors (Basel). 2022 Mar 28;22(7):2597. doi: 10.3390/s22072597.
6
Automated Android Malware Detection Using User Feedback.利用用户反馈实现自动化的安卓恶意软件检测
Sensors (Basel). 2022 Aug 31;22(17):6561. doi: 10.3390/s22176561.
7
An Informative and Comprehensive Behavioral Characteristics Analysis Methodology of Android Application for Data Security in Brain-Machine Interfacing.脑机接口中用于数据安全的 Android 应用程序的信息丰富且全面的行为特征分析方法。
Comput Math Methods Med. 2020 Mar 10;2020:3658795. doi: 10.1155/2020/3658795. eCollection 2020.
8
Convolution neural network with batch normalization and inception-residual modules for Android malware classification.基于批量归一化和 Inception-Residual 模块的卷积神经网络用于安卓恶意软件分类。
Sci Rep. 2022 Aug 17;12(1):13996. doi: 10.1038/s41598-022-18402-6.
9
Detection of Android Malware in the Internet of Things through the K-Nearest Neighbor Algorithm.通过K近邻算法检测物联网中的安卓恶意软件。
Sensors (Basel). 2023 Aug 18;23(16):7256. doi: 10.3390/s23167256.
10
A static analysis approach for Android permission-based malware detection systems.基于静态分析的 Android 权限型恶意软件检测系统。
PLoS One. 2021 Sep 30;16(9):e0257968. doi: 10.1371/journal.pone.0257968. eCollection 2021.

本文引用的文献

1
Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation).安卓系统中基于静态分析的恶意软件检测:FeCO(特征、分类与混淆)综述
PeerJ Comput Sci. 2021 Jun 11;7:e522. doi: 10.7717/peerj-cs.522. eCollection 2021.
2
A first look at Android applications in Google Play related to COVID-19.首次审视谷歌应用商店中与新冠病毒相关的安卓应用程序。
Empir Softw Eng. 2021;26(4):57. doi: 10.1007/s10664-021-09943-x. Epub 2021 Apr 21.