• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种利用权限智能来区分安卓协同恶意软件和单个应用恶意软件的准确方法。

An accurate approach to discriminate android colluded malware from single app malware using permissions intelligence.

作者信息

Mawoh Roger Yiran, Wacka Joan Beri Ali, Tchakounte Franklin, Fachkha Claude

机构信息

Department of Mathematics and Computer Science, Faculty of Science, University of Ngaoundéré, Ngaoundéré, Cameroon.

Department of Computer Science, Faculty of Science, University of Buea, Buea, Cameroon.

出版信息

Sci Rep. 2025 Mar 28;15(1):10680. doi: 10.1038/s41598-025-86568-w.

DOI:10.1038/s41598-025-86568-w
PMID:40148405
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11950374/
Abstract

Mobile devices are vulnerable to malicious apps that jeopardize user privacy and device integrity. This includes single-app malware that operates independently and colluding Android apps that collaborate with each other to carry out a malicious attack. Existing detection methods primarily focus on single-app malware and hence will misclassify colluding Android apps. This paper introduces SigColDroid, a novel approach for detecting colluding Android apps and single-app malware by leveraging dangerous permissions. The research begins by extracting and identifying key features, such as permissions, smali file size, and permission rates, for model training. To facilitate comprehensive evaluation, a balanced dataset of 1455 apps is created, consisting of 485 benign apps, 485 randomly sampled single-app malware from the AndroZoo repository, and 485 colluding applications. Extensive experimentation is conducted using five ensemble classifiers: random forest, Extra Trees, AdaBoost, XGBoost, and LightGBM alongside our proposed custom Artificial Neural Network (ANN) and Deep Neural Network (DNN) architectures. The classifiers are evaluated based on five metrics: Precision, Recall, F1-score, accuracy, and the area under the receiver operation curve (ROC_AUC). The experimental findings highlight the following key insights: (i) Identification of the five most significant permission features for detecting colluding applications; (ii) Positive impact of smali file size and permission rates on classification performance; (iii) Superior performance of Random Forest with a ROC_AUC of 99.48% and LightGBM with 96.91% accuracy, 96.96% precision, 96.90% recall and 96.90% F1-score compared to other classifiers; (iv) Comparative analysis with previous research demonstrates that SigColDroid, despite utilizing fewer features, outperforms state-of-the-art approaches. The proposed approach presents an effective solution for detecting colluding Android apps using permissions and contributes to the advancement of improved detection and prevention mechanisms in mobile security.

摘要

移动设备容易受到恶意应用程序的攻击,这些恶意应用程序会危及用户隐私和设备完整性。这包括独立运行的单应用恶意软件以及相互勾结以实施恶意攻击的安卓应用程序。现有的检测方法主要集中在单应用恶意软件上,因此会将勾结的安卓应用程序误分类。本文介绍了SigColDroid,这是一种通过利用危险权限来检测勾结安卓应用程序和单应用恶意软件的新方法。该研究首先提取并识别关键特征,如权限、smali文件大小和权限率,用于模型训练。为了便于进行全面评估,创建了一个由1455个应用程序组成的平衡数据集,其中包括485个良性应用程序、从AndroZoo存储库中随机抽取的485个单应用恶意软件以及485个勾结应用程序。使用五个集成分类器进行了广泛的实验:随机森林、极端随机树、自适应增强、XGBoost和LightGBM,以及我们提出的自定义人工神经网络(ANN)和深度神经网络(DNN)架构。基于五个指标对分类器进行评估:精确率、召回率、F1分数、准确率以及接收者操作特征曲线下面积(ROC_AUC)。实验结果突出了以下关键见解:(i)识别出用于检测勾结应用程序的五个最重要的权限特征;(ii)smali文件大小和权限率对分类性能的积极影响;(iii)随机森林的性能优越,ROC_AUC为99.48%,LightGBM的准确率为96.91%、精确率为96.96%、召回率为96.90%、F1分数为96.90%,与其他分类器相比表现更佳;(iv)与先前研究的对比分析表明,SigColDroid尽管使用的特征较少,但性能优于现有方法。所提出的方法为使用权限检测勾结安卓应用程序提供了一种有效的解决方案,并有助于推动移动安全中改进检测和预防机制的发展。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/030c/11950374/682ecae82823/41598_2025_86568_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/030c/11950374/f36801d8c825/41598_2025_86568_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/030c/11950374/0c29b32bff58/41598_2025_86568_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/030c/11950374/17bb9374d58b/41598_2025_86568_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/030c/11950374/ef2624fc572f/41598_2025_86568_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/030c/11950374/1f1afc5a7c59/41598_2025_86568_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/030c/11950374/32183a0d573c/41598_2025_86568_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/030c/11950374/42fb599166a9/41598_2025_86568_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/030c/11950374/54c568a73147/41598_2025_86568_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/030c/11950374/682ecae82823/41598_2025_86568_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/030c/11950374/f36801d8c825/41598_2025_86568_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/030c/11950374/0c29b32bff58/41598_2025_86568_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/030c/11950374/17bb9374d58b/41598_2025_86568_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/030c/11950374/ef2624fc572f/41598_2025_86568_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/030c/11950374/1f1afc5a7c59/41598_2025_86568_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/030c/11950374/32183a0d573c/41598_2025_86568_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/030c/11950374/42fb599166a9/41598_2025_86568_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/030c/11950374/54c568a73147/41598_2025_86568_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/030c/11950374/682ecae82823/41598_2025_86568_Fig9_HTML.jpg

相似文献

1
An accurate approach to discriminate android colluded malware from single app malware using permissions intelligence.一种利用权限智能来区分安卓协同恶意软件和单个应用恶意软件的准确方法。
Sci Rep. 2025 Mar 28;15(1):10680. doi: 10.1038/s41598-025-86568-w.
2
A detection method for android application security based on TF-IDF and machine learning.基于 TF-IDF 和机器学习的安卓应用安全检测方法。
PLoS One. 2020 Sep 11;15(9):e0238694. doi: 10.1371/journal.pone.0238694. eCollection 2020.
3
Detecting Malware by Analyzing App Permissions on Android Platform: A Systematic Literature Review.基于安卓平台应用权限分析的恶意软件检测:系统文献综述。
Sensors (Basel). 2022 Oct 18;22(20):7928. doi: 10.3390/s22207928.
4
FSDroid:- A feature selection technique to detect malware from Android using Machine Learning Techniques: FSDroid.FSDroid:一种使用机器学习技术从安卓系统中检测恶意软件的特征选择技术:FSDroid。
Multimed Tools Appl. 2021;80(9):13271-13323. doi: 10.1007/s11042-020-10367-w. Epub 2021 Jan 14.
5
MVDroid: an android malicious VPN detector using neural networks.MVDroid:一种使用神经网络的安卓恶意VPN检测器。
Neural Comput Appl. 2023 Apr 3:1-11. doi: 10.1007/s00521-023-08512-1.
6
MADFU: An Improved Malicious Application Detection Method Based on Features Uncertainty.MADFU:一种基于特征不确定性的改进型恶意应用检测方法。
Entropy (Basel). 2020 Jul 20;22(7):792. doi: 10.3390/e22070792.
7
BERT ensemble based MBR framework for android malware detection.基于BERT集成的安卓恶意软件检测MBR框架。
Sci Rep. 2025 Apr 23;15(1):14027. doi: 10.1038/s41598-025-98596-7.
8
PermDroid a framework developed using proposed feature selection approach and machine learning techniques for Android malware detection.PermDroid是一个使用所提出的特征选择方法和机器学习技术开发的用于安卓恶意软件检测的框架。
Sci Rep. 2024 May 10;14(1):10724. doi: 10.1038/s41598-024-60982-y.
9
AMDDLmodel: Android smartphones malware detection using deep learning model.AMDDL 模型:基于深度学习模型的安卓智能手机恶意软件检测。
PLoS One. 2024 Jan 19;19(1):e0296722. doi: 10.1371/journal.pone.0296722. eCollection 2024.
10
AndroMalPack: enhancing the ML-based malware classification by detection and removal of repacked apps for Android systems.AndroMalPack:通过检测和移除针对 Android 系统的重打包应用,增强基于机器学习的恶意软件分类。
Sci Rep. 2022 Nov 14;12(1):19534. doi: 10.1038/s41598-022-23766-w.

本文引用的文献

1
PermDroid a framework developed using proposed feature selection approach and machine learning techniques for Android malware detection.PermDroid是一个使用所提出的特征选择方法和机器学习技术开发的用于安卓恶意软件检测的框架。
Sci Rep. 2024 May 10;14(1):10724. doi: 10.1038/s41598-024-60982-y.
2
Evaluation and classification of obfuscated Android malware through deep learning using ensemble voting mechanism.基于集成投票机制的深度学习评估和分类混淆型 Android 恶意软件。
Sci Rep. 2023 Feb 22;13(1):3093. doi: 10.1038/s41598-023-30028-w.
3
AndroMalPack: enhancing the ML-based malware classification by detection and removal of repacked apps for Android systems.
AndroMalPack:通过检测和移除针对 Android 系统的重打包应用,增强基于机器学习的恶意软件分类。
Sci Rep. 2022 Nov 14;12(1):19534. doi: 10.1038/s41598-022-23766-w.
4
Towards a threat assessment framework for apps collusion.迈向应用程序勾结的威胁评估框架。
Telecommun Syst. 2017;66(3):417-430. doi: 10.1007/s11235-017-0296-1. Epub 2017 Mar 7.
5
DroidFusion: A Novel Multilevel Classifier Fusion Approach for Android Malware Detection.DroidFusion:一种用于 Android 恶意软件检测的新型多级分类器融合方法。
IEEE Trans Cybern. 2019 Feb;49(2):453-466. doi: 10.1109/TCYB.2017.2777960. Epub 2018 Jan 3.
6
Reducing the dimensionality of data with neural networks.使用神经网络降低数据维度。
Science. 2006 Jul 28;313(5786):504-7. doi: 10.1126/science.1127647.