With the increasing popularity of Android in the last decade, Android is popular among users as well as attackers. The vast number of android users grabs the attention of attackers on android. Due to the continuous evolution of the variety and attacking techniques of android malware, our detection methods should need an update too. Most of the researcher's works are based on static features, and very few focus on dynamic features. In this paper, we are filling the literature gap by detecting android malware using System calls. We are running the malicious app in a monitored and controlled environment using an emulator to detect malware. Malicious behavior is activated with some simulated events during its runtime to activate its hostile behavior. Logs collected during the app's runtime are analyzed and fed to different machine learning models for Detection and Family classification of Malware. The result indicates that K-Nearest Neighbor and the Decision Tree gave the highest accuracy in malware detection and Family Classification respectively.
翻译:Android在过去十年中越来越受人欢迎, Android在用户和攻击者中越来越受欢迎。 大量的机器人用户和机器人用户都吸引了攻击者和机器人的注意力。 由于各种攻击技术和机器人恶意软件的不断演化, 我们的检测方法也需要更新。 研究人员的多数作品都以静态特征为基础, 很少关注动态特征。 在本文中, 我们通过使用系统电话检测和机器人恶意软件来填补文献空白。 我们正在一个监测和控制的环境中运行恶意应用程序, 使用模拟器来检测恶意软件。 恶意行为在运行期间与一些模拟事件发生, 以激活其敌对行为。 应用程序运行时收集的日志被分析并输入到不同的机器学习模型中, 用于Malware的检测和家庭分类 。 结果显示 K- Nearest Neighbor 和决定树分别给出了恶意检测和家庭分类的最高精度 。