skip to main content
10.1145/3097983.3098026acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article
Best Paper

HinDroid: An Intelligent Android Malware Detection System Based on Structured Heterogeneous Information Network

Published:13 August 2017Publication History

ABSTRACT

With explosive growth of Android malware and due to the severity of its damages to smart phone users, the detection of Android malware has become increasingly important in cybersecurity. The increasing sophistication of Android malware calls for new defensive techniques that are capable against novel threats and harder to evade. In this paper, to detect Android malware, instead of using Application Programming Interface (API) calls only, we further analyze the different relationships between them and create higher-level semantics which require more effort for attackers to evade the detection. We represent the Android applications (apps), related APIs, and their rich relationships as a structured heterogeneous information network (HIN). Then we use a meta-path based approach to characterize the semantic relatedness of apps and APIs. We use each meta-path to formulate a similarity measure over Android apps, and aggregate different similarities using multi-kernel learning. Then each meta-path is automatically weighted by the learning algorithm to make predictions. To the best of our knowledge, this is the first work to use structured HIN for Android malware detection. Comprehensive experiments on real sample collections from Comodo Cloud Security Center are conducted to compare various malware detection approaches. Promising experimental results demonstrate that our developed system HinDroid outperforms other alternative Android malware detection techniques.

Skip Supplemental Material Section

Supplemental Material

ye_intelligent_android.mp4

mp4

341.3 MB

References

  1. Iker Burguera, Urko Zurutuza, and Simin Nadjm-Tehrani. 2011. Crowdroid: Behavior-based Malware Detection System for Android SPSM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Marko Dimjasevic, Simone Atzeni, Ivo Ugrina, and Zvonimir Rakamaric 2016. Evaluation of Android Malware Detection Based on System Calls IWSPA.Google ScholarGoogle Scholar
  3. Marko Dimjavseviç, Simone Atzeni, Ivo Ugrina, and Zvonimir Rakamaric 2015. Android Malware Detection Based on System Calls. Technical Report.Google ScholarGoogle Scholar
  4. Adrienne Porter Felt, Matthew Finifter, Erika Chin, Steve Hanna, and David Wagner. 2011. A Survey of Mobile Malware in the Wild. In SPSM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Mehmet Gönen and Ethem Alpaydin 2011. Multiple Kernel Learning Algorithms. Journal of Machine Learning Research Vol. 12 (2011), 2211--2268.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Jiawei Han, Yizhou Sun, Xifeng Yan, and Philip S. Yu. 2010. Mining Knowledge from Databases: An Information Network Analysis Approach SIGMOD.Google ScholarGoogle Scholar
  7. Xiaofei He, Deng Cai, and Partha Niyogi 2005. Laplacian Score for Feature Selection. In Advances in Neural Information Processing Systems 18.Google ScholarGoogle Scholar
  8. Shifu Hou, Aaron Saas, Yanfang Ye, and Lifei Chen. 2016. DroidDelver: An Android Malware Detection System Using Deep Belief Network Based on API Call Blocks. In WAIM. 54--66.Google ScholarGoogle Scholar
  9. Xiangnan Kong, Jiawei Zhang, and Philip S. Yu. 2013. Inferring anchor links across multiple heterogeneous social networks CIKM. 179--188.Google ScholarGoogle Scholar
  10. N. Peiravian and X. Zhu 2013. Machine Learning for Android Malware Detection Using Permission and API Calls IEEE ICTAI. 300--305.Google ScholarGoogle Scholar
  11. Y. Yu, Z. Chen, B. Cao, W. Dong, Y. Guo, and J. Cao. 2013. MobSafe: cloud computing based forensic analysis for massive mobile applications using data mining. Tsinghua Science and Technology Vol. 18, 4 (August 2013), 418--427. Google ScholarGoogle ScholarCross RefCross Ref
  12. Chao Yang, Zhaoyan Xu, Guofei Gu, Vinod Yegneswaran, and Phillip Porras 2014. Droid Miner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications. In 19th European Symposium on Research in Computer Security. 163--182.Google ScholarGoogle Scholar
  13. Jiawei Zhang, Xiangnan Kong, and Philip S. Yu. 2013. Predicting Social Links for New Users across Aligned Heterogeneous Social Networks ICDM. 1289--1294.Google ScholarGoogle Scholar
  14. Jiawei Zhang, Xiangnan Kong, and Philip S. Yu. 2014. Transferring heterogeneous links across location-based social networks WSDM. 303--312.Google ScholarGoogle Scholar
  15. Peixiang Zhao, Jiawei Han, and Yizhou Sun 2009. P-Rank: a comprehensive structural similarity measure over information networks CIKM. 553--562.Google ScholarGoogle Scholar

Index Terms

  1. HinDroid: An Intelligent Android Malware Detection System Based on Structured Heterogeneous Information Network

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      KDD '17: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
      August 2017
      2240 pages
      ISBN:9781450348874
      DOI:10.1145/3097983

      Copyright © 2017 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 13 August 2017

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      KDD '17 Paper Acceptance Rate64of748submissions,9%Overall Acceptance Rate1,133of8,635submissions,13%

      Upcoming Conference

      KDD '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader