Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Android malicious application detection method based on improved gray wolf algorithm

A malicious application and detection method technology, applied in computing, computing models, computer components and other directions, can solve the problems of high feature dimension, misclassification of malicious samples, huge workload of machine learning classifiers, etc. The effect of search ability

Active Publication Date: 2022-07-12
GUANGXI UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when using machine learning-based detection methods, in order to obtain as much classification information as possible, a large number of fine-grained features are usually extracted, which makes the feature dimension very high, which brings a huge workload to the machine learning classifier and reduces the performance of the classifier. classification accuracy
In addition, in the real world, the distribution of Android malicious applications and benign applications is unbalanced, the number of benign applications is far greater than the number of malicious applications, and an unbalanced data set will bias the machine learning classifier to a large class of samples, that is, benign applications , it is easy to cause malicious samples to be misclassified

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Android malicious application detection method based on improved gray wolf algorithm
  • Android malicious application detection method based on improved gray wolf algorithm
  • Android malicious application detection method based on improved gray wolf algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0046] The Android malicious application detection method based on the improved gray wolf algorithm includes the following steps:

[0047] Step 1: Collect sample sets, namely Android applications (APK for short), including benign APKs and malicious APKs;

[0048]Step 2: Decompile the APK, extract its API call information and permission application information as features, and vectorize it into a feature set to form a sample feature set; specifically:

[0049] 2a) use the decompilation tool apktool to decompile the collected APK, obtain the *.smali file, scan the "invoke-virtual" statement in each smali file in turn, and obtain the API call information of the APK;

[0050] 2b) Use the tool in the Android SDK - appt to extract the permission applied by the APK, and obtain the permission information of the APK;

[0051] 2c) Take the complete set of API call information and permission information of all APKs as the feature set; each row represents an APK file, each column represe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an Android malicious application detection method based on an improved gray wolf algorithm, which mainly solves the problem that the classifier modeling time is too long when the existing Android malicious application detection method based on machine learning detects a high-dimensional unbalanced data set. , the problem that malicious samples are easily misclassified. It includes the following steps: 1) Collect samples, including benign samples and malicious samples; 2) Decompile the samples, and extract the sample features to form a sample feature set; 3) Divide the sample feature set into a training set and a test set; 4) Use The improved gray wolf algorithm performs feature selection and selects the optimal feature subset; 5) Use the optimal feature subset to train the classifier. The feature selection method in the present invention can select the optimal feature subset, greatly reduces the construction time of the classifier, and can improve the detection efficiency and detection accuracy of Android malicious application detection.

Description

technical field [0001] The invention relates to the field of software security, in particular to an Android malicious application detection method based on an improved gray wolf algorithm. Background technique [0002] With the rapid development of the mobile Internet, Android has become one of the most popular mobile operating systems today. Because of its openness, Android has attracted countless developers to develop and make their own applications on it, but its huge development space also attracts a large number of hackers. Hackers use malicious applications to infringe on the property security and privacy of Android system users. Safety. Android malicious application detection has become an important means to prevent such threats. [0003] With the development of machine learning, many scholars have begun to apply machine learning methods to Android malware detection. However, when using detection methods based on machine learning, in order to obtain as much classif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56G06K9/62G06N3/00
CPCG06F21/56G06F18/2411G06F18/24155G06F18/24323
Inventor 陆寅丽霍林陈绍栋郭雅蓉覃志建王宏伟冯锦豪
Owner GUANGXI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products