TY - JOUR A2 - Nicopolitidis,佩特罗斯AU - Egitmen,阿尔珀AU - 布鲁特,伊尔凡AU - Aygun,河灿AU - 京迪兹,A.舱底AU - Seyrekbasan,奥马尔AU - Yavuz的,格克汗A. PY - 2020 DA - 2020/ 4月20日TI - 通过跳过革兰基于恶意软件检测SP打击手机恶意软件闪避 - 6726147 VL - 2020 AB - Android的恶意软件检测是在安全领域的重要研究课题。有多种基于静态和动态恶意软件分析现有的恶意软件检测模型。然而,这些车型都不是很成功,当谈到避重就轻恶意软件检测。在这项研究中,我们的目的是创建一个基于自然语言模型中的恶意软件检测模型称为跳克来检测具有最高的准确率可能回避恶意软件。为了训练和测试我们提出的模型中,我们使用名为阿古斯的Android恶意软件数据集(AMD),因为AMD含有各种回避恶意软件家族以及关于它们的详细信息了最新的恶意软件数据集。同时,对于良性样本中,我们使用的Comodo Android的良性数据集。从Android应用程序指令序列提取基于跳跃语法特征我们提出的模型开始。然后,它采用了一些机器学习算法进行分类的样本为良性或恶意软件。我们测试了我们提出的模型有两种不同的情况。 In the first scenario, the random forest-based classifier performed with 95.64% detection accuracy on the entire dataset and 95% detection accuracy against evasive only samples. In the second scenario, we created a test dataset that contained zero-day malware samples only. For the training set, we did not use any sample that belongs to the malware families in the test set. The random forest-based model performed with 37.36% accuracy rate against zero-day malware. In addition, we compared our proposed model’s malware detection performance against several commercial antimalware applications using VirusTotal API. Our model outperformed 7 out of 10 antimalware applications and tied with one of them on the same test scenario. SN - 1939-0114 UR - https://doi.org/10.1155/2020/6726147 DO - 10.1155/2020/6726147 JF - Security and Communication Networks PB - Hindawi KW - ER -