Android Malware Classifier based on Static Feature and Machine Learning
碩士 === 國立中央大學 === 資訊管理學系 === 105 === It is important to classify each particular type of malware in order to know the malware features of each class, so that the corresponding protective measures can be made. The number of malware is not only gradually rising and constantly variants. Making a malwar...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2017
|
Online Access: | http://ndltd.ncl.edu.tw/handle/73974670880931543578 |
id |
ndltd-TW-105NCU05396030 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-105NCU053960302017-10-22T04:29:52Z http://ndltd.ncl.edu.tw/handle/73974670880931543578 Android Malware Classifier based on Static Feature and Machine Learning 基於靜態特徵與機器學習之Android惡意程式分類研究 ZIH-HUEI YOU 游子慧 碩士 國立中央大學 資訊管理學系 105 It is important to classify each particular type of malware in order to know the malware features of each class, so that the corresponding protective measures can be made. The number of malware is not only gradually rising and constantly variants. Making a malware features more than one possibility class, but also may contain other malware class characteristics. In this study have to detection of malware for classification and in addition to check whether it contains other classes of risk values, the use of time-saving and high coverage of the static analysis. The static analysis past literature extraction feature almost all use permissions, API calls, components and so on to detect malicious programs, but these features need to rely on expert analysis to filter these features before they can be used, and opcode do not need to rely on expert analysis, Directly using raw data for analysis, and is closely related to the application code, this study uses opcode as a static analysis feature as a study. In this study, we propose an application detection platform, which uses opcode sequence and machine learning to classify. We use J48, RandomForest (RF), NaiveBayes, LibSVM and Partial Decision Tree (PART), which are commonly used in static analysis literature. We use 10-fold cross validation to training and testing. The result is the RandomForest with 4gram opcode sequence of F-Measure has of 97.5%. After classification we can calculate risk value of application that whether contains other class of malware features and given the percentage as a basis for judging. Yi-Ming Chen 陳奕明 2017 學位論文 ; thesis 67 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中央大學 === 資訊管理學系 === 105 === It is important to classify each particular type of malware in order to know the malware features of each class, so that the corresponding protective measures can be made. The number of malware is not only gradually rising and constantly variants. Making a malware features more than one possibility class, but also may contain other malware class characteristics. In this study have to detection of malware for classification and in addition to check whether it contains other classes of risk values, the use of time-saving and high coverage of the static analysis. The static analysis past literature extraction feature almost all use permissions, API calls, components and so on to detect malicious programs, but these features need to rely on expert analysis to filter these features before they can be used, and opcode do not need to rely on expert analysis, Directly using raw data for analysis, and is closely related to the application code, this study uses opcode as a static analysis feature as a study. In this study, we propose an application detection platform, which uses opcode sequence and machine learning to classify. We use J48, RandomForest (RF), NaiveBayes, LibSVM and Partial Decision Tree (PART), which are commonly used in static analysis literature. We use 10-fold cross validation to training and testing. The result is the RandomForest with 4gram opcode sequence of F-Measure has of 97.5%. After classification we can calculate risk value of application that whether contains other class of malware features and given the percentage as a basis for judging.
|
author2 |
Yi-Ming Chen |
author_facet |
Yi-Ming Chen ZIH-HUEI YOU 游子慧 |
author |
ZIH-HUEI YOU 游子慧 |
spellingShingle |
ZIH-HUEI YOU 游子慧 Android Malware Classifier based on Static Feature and Machine Learning |
author_sort |
ZIH-HUEI YOU |
title |
Android Malware Classifier based on Static Feature and Machine Learning |
title_short |
Android Malware Classifier based on Static Feature and Machine Learning |
title_full |
Android Malware Classifier based on Static Feature and Machine Learning |
title_fullStr |
Android Malware Classifier based on Static Feature and Machine Learning |
title_full_unstemmed |
Android Malware Classifier based on Static Feature and Machine Learning |
title_sort |
android malware classifier based on static feature and machine learning |
publishDate |
2017 |
url |
http://ndltd.ncl.edu.tw/handle/73974670880931543578 |
work_keys_str_mv |
AT zihhueiyou androidmalwareclassifierbasedonstaticfeatureandmachinelearning AT yóuzihuì androidmalwareclassifierbasedonstaticfeatureandmachinelearning AT zihhueiyou jīyújìngtàitèzhēngyǔjīqìxuéxízhīandroidèyìchéngshìfēnlèiyánjiū AT yóuzihuì jīyújìngtàitèzhēngyǔjīqìxuéxízhīandroidèyìchéngshìfēnlèiyánjiū |
_version_ |
1718556552551464960 |