Neural Visualization of Android Malware Families

Due to the ever increasing amount and severity of attacks aimed at compromising smartphones in general, and Android devices in particular, much effort have been devoted in recent years to deal with such incidents. However, scant attention has been devoted to study the interplay between visualization techniques and Android malware detection. As an initial proposal, neural projection architectures are applied in present work to analyze malware apps data and characterize malware families. By the advanced and intuitive visualization, the proposed solution provides with an overview of the structure of the families dataset and ease the analysis of their internal organization. Dimensionality reduction based on unsupervised neural networks is performed on family information from the Android Malware Genome (Malgenome) dataset.

[1]  Simin Nadjm-Tehrani,et al.  Detection and Visualization of Android Malware Behavior , 2016, J. Electr. Comput. Eng..

[2]  Daniel A. Keim,et al.  A Survey of Visualization Systems for Malware Analysis , 2015, EuroVis.

[3]  Luo Si,et al.  A Probabilistic Discriminative Model for Android Malware Detection with Decompiled Source Code , 2015, IEEE Transactions on Dependable and Secure Computing.

[4]  Stefan Kraxberger,et al.  Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play) , 2016, Secur. Commun. Networks.

[5]  Srinivas Mukkamala,et al.  Mobile malware visual analytics and similarities of Attack Toolkits (Malware gene analysis) , 2013, 2013 International Conference on Collaboration Technologies and Systems (CTS).

[6]  Aziz Mohaisen,et al.  Detecting and classifying method based on similarity matching of Android malware behavior with profile , 2016, SpringerPlus.

[7]  Marc M. Van Hulle,et al.  Enhancing the Yield of High-Density electrode Arrays through Automated electrode Selection , 2012, Int. J. Neural Syst..

[8]  Gonzalo Álvarez,et al.  MAMA: MANIFEST ANALYSIS FOR MALWARE DETECTION IN ANDROID , 2013, Cybern. Syst..

[9]  Veelasha Moonsamy,et al.  Mining permission patterns for contrasting clean and malicious android applications , 2014, Future Gener. Comput. Syst..

[10]  Álvaro Herrero,et al.  A Neural-Visualization IDS for Honeynet Data , 2012, Int. J. Neural Syst..

[11]  Emilio Corchado,et al.  Maximum and Minimum Likelihood Hebbian Learning for Exploratory Projection Pursuit , 2002, ICANN.

[12]  L. Chou,et al.  An empirical analysis of land property lawsuits and rainfalls , 2016, SpringerPlus.

[13]  Pengcheng Ma,et al.  ψ-Contraction and $$(\phi ,\varphi )$$(ϕ,φ)-contraction in Menger probabilistic metric space , 2016, SpringerPlus.

[14]  Saba Arshad,et al.  Android Malware Detection & Protection: A Survey , 2016 .

[15]  Álvaro Herrero,et al.  Neural Analysis of HTTP Traffic for Web Attack Detection , 2015, CISIS-ICEUTE.

[16]  Won Ryu,et al.  Analyzing and detecting method of Android malware via disassembling and visualization , 2014, 2014 International Conference on Information and Communication Technology Convergence (ICTC).

[17]  Álvaro Herrero,et al.  Neural visualization of network traffic data for intrusion detection , 2011, Appl. Soft Comput..

[18]  Yajin Zhou,et al.  Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.

[19]  Emilio Corchado,et al.  Connectionist Techniques For The Identification And Suppression Of Interfering Underlying Factors , 2003, Int. J. Pattern Recognit. Artif. Intell..

[20]  Colin Fyfe,et al.  A Neural Network for PCA and Beyond , 1997, Neural Processing Letters.

[21]  Karl Pearson F.R.S. LIII. On lines and planes of closest fit to systems of points in space , 1901 .

[22]  Erkki Oja,et al.  Principal components, minor components, and linear neural networks , 1992, Neural Networks.

[23]  Javier Bajo,et al.  idMAS-SQL: Intrusion Detection Based on MAS to Detect and Block SQL injection through data mining , 2013, Inf. Sci..