Android malware clustering analysis on network-level behavior

5Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Android becomes the most popular operating system for smart phones today. However, malicious application proposes a huge threat on Android platform. Many malware are designed to steal personal information of user or control the device of user through the network. In this paper, we show how to efficiently cluster network behavior by analyzing the statistical information of HTTP flow at the network level. To do so, we observe the specific statistical information on HTTP flow generated by more than 8,000 malware. In the end, we separate malware’s malicious network into seven different clusters using clustering technology. Our evaluation experiments show that HTTP flows in the same cluster have similar network behavior and there are big differences between the different clusters. This similarity and variability are manifested at some specific network-level statistical characteristics. In addition, in order to show the results of the study more intuitively, we reduce the dimensionality of the original features, and show the final clustering results in two-dimensional space.

Cite

CITATION STYLE

APA

Wang, S., Chen, Z., Li, X., Wang, L., Ji, K., & Zhao, C. (2017). Android malware clustering analysis on network-level behavior. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10361 LNCS, pp. 796–807). Springer Verlag. https://doi.org/10.1007/978-3-319-63309-1_71

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free