The Abnormal Mobile Malware Analysis Based on Behavior Categorization

Article Preview

Abstract:

With the explosive growth of mobile malware in mobile internet, many polymorphic and metamorphic mobile malware appears and causes difficulty of detection. A mobile malware network behavior data mining method based on behavior categorization is proposed to detect the behavior of new or metamorphic mobile malware. The network behavior is divided into different categories after analyzing the behavior character of mobile malware and those different behavior data of known malware and normal action are used to train the Naïve Bayesian classifier respectively. Those Naïve Bayesian classifiers are used to detect the mobile malware network behavior. The experiment result shows that Behavior Categorization based Naïve Bayesian Classifier (BCNBC) can improve the detection accuracy and it can meet the requirement of real time process in mobile internet.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 765-767)

Pages:

994-997

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] J. A. Morales, P. J. Clarke, Y. Deng, Testing and evaluating virus detectors for handheld devices, Journal in Computer Virology, vol. 2, no. 2(2006), pp.135-147.

DOI: 10.1007/s11416-006-0024-y

Google Scholar

[2] T. Blasing, L. Batyuk, A. Schmidt, S. Camtepe, and S. Albayrak, An android application sandbox system for suspicious software detection, in 5th International Conference on Malicious and Unwanted Software (MALWARE)(2010), p.55–62.

DOI: 10.1109/malware.2010.5665792

Google Scholar

[3] M. G. Schultz, E. Eskin, E. Zadok, and S. J. Stolfo, Data mining methods for detection of new malicious executables. In: IEEE Symposium on Security and Privacy(2001), p.38–49.

DOI: 10.1109/secpri.2001.924286

Google Scholar

[4] A.S. Shamili, C. Bauckhage, Alpcan, Tansu, Malware Detection on Mobile Devices Using Distributed Machine Learning, In: Proceedings of the 20th International Conference on Pattern Recognition (ICPR)(2010), p.4348 – 4351.

DOI: 10.1109/icpr.2010.1057

Google Scholar

[5] L. Chen, N. Zhen, Y. H. Guo, M. Xu, Y.T. Hu, Computer Applications and Software Vol. 27, No. 1 (2010), pp.92-95(in Chinese).

Google Scholar