Browse > Article
http://dx.doi.org/10.3745/KTSDE.2015.4.4.169

Malicious Application Determination Using the System Call Event  

Yun, SeokMin (한신대학교 컴퓨터공학과)
Ham, YouJeong (한신대학교 컴퓨터공학과)
Han, GeunShik (한신대학교 컴퓨터공학부)
Lee, HyungWoo (한신대학교 컴퓨터공학부)
Publication Information
KIPS Transactions on Software and Data Engineering / v.4, no.4, 2015 , pp. 169-176 More about this Journal
Abstract
Recently smartphone market is rapidly growing and application market has also grown significantly. Mobile applications have been provided in various forms, such as education, game, SNS, weather and news. And It is distributed through a variety of distribution channels. Malicious applications deployed with malicious objectives are growing as well as applications that can be useful in everyday life well. In this study, Events from a malicious application that is provided by the normal application deployment and Android MalGenome Project through the open market were extracted and analyzed. And using the results, We create a model to determine whether the application is malicious. Finally, model was evaluated using a variety of statistical method.
Keywords
Malicious Applications; Machine Learning; Event Extraction; Logistic Regression;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Wajeb, Abdulrahman Mirza, "Software Vulnerabilities, Banking Threats, Botnets and Malware Self-Protection Technologies," International Journal of Computer Science Issues(IJCSI), Vol.8, No.1, pp.236-241, 2011.
2 I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani, "Crowdroid: Behavoir-Based Malware Detection System for Android," Proceeding of the 1st ACM workshop on security and privacy in smartphones and mobile devices (SPSM'11), ACM, Vol.1, pp.15-26, 2011.
3 Y. J. Ham, "Malicious Application Event Discrimination and Diagnosis Mechanism on SmartPhone," Master's Thesis, Hanshin University, 2014.
4 Suphakit Niwattanakul, Jatsada Singthongchai, Ekkachai Naenudorn, and Supachanun Wanapu, "Using of Jaccard Coefficient for Keywards Similarity," Proceedings of the International MultiConference of Engineering and Computer Scientists 2013 (IMECS 2013), Vol.1, pp.13-15, 2013.
5 Yajin Zhou, Xuxian Jiang, Android Malgenome Project, [Internet], http://www.malgenomeproject.org/
6 Strace, trace system calls and signals, [Internet], http://linux.die.net/man/1/strace/
7 Stehman, Stephen V, "Selecting and interpreting measures of thematic classification accuracy," Remote Sensing of Environment, Vol.62, No.1, pp.77-89, 1997.   DOI
8 Fawcelt, Tom, "An Introduction to ROC Analysis," Pattern Recognition Letters, Vol.27, No.8, pp.861-874, 2006.   DOI
9 Swets, John A, "Signal detection theory and ROC analysis in psychology and diagnostics," collected papers, Lawrence Erlbaum Associates, Mahwah, NJ, 1996.
10 C. H. Jun, "Data mining Techniques," Hannarae, 2012.
11 Breiman, L., Friedman, J., Stone, C. J., and Olshen, R. A., "Classification and regression trees," CRC press, 1984.
12 Christopher M. Bishop, "Pattern Recognition and Machine Learning," Springer, pp.205, 2006.
13 Y. J. Ham, H. W. Lee, "Normal and Malicious Application Pattern Analysis using System Call Event on Android Mobile Devices for Similarity Extraction," Journal of Internet Computing and Services(JICS), Vol.16, No.8, pp.125-139, 2013.