Skip to main content

ARP-Miner: Mining Risk Patterns of Android Malware

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9426))

Abstract

Android applications need to request permissions to access sensitive personal data and system resources. Certain permissions may be requested by Android malware to facilitate their malicious activities. In this paper, we present ARP-Miner, an algorithm based on association rule mining that can automatically extract Android Risk Patterns indicating possible malicious activities of apps. The experimental results show that ARP-Miner can efficiently discover risk rules associating permission request patterns with malicious activities. Examples to relate the extracted risk patterns with behaviors of typical malware families are presented. It is also shown that the extracted risk patterns can be used for malware detection.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. F-secure, threat report h2 (2013). http://www.f-secure.com/static/doc/labs_global/Research/Threat_Report_H2_2013.pdf

  2. Agrawal, R., Srikant, R., Others: Fast algorithms for mining association rules. In: Proceeding 20th International Conference Very Large Data Bases, VLDB, vol. 1215, pp. 487–499 (1994)

    Google Scholar 

  3. Cong, G., Tan, K.L., Tung, A.K., Xu, X.: Mining top-k covering rule groups for gene expression data. In: Proceedings of the 2005 ACM SIGMOD international conference on Management of data, pp. 670–681. ACM (2005)

    Google Scholar 

  4. Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: Proceedings of the 16th ACM conference on Computer and Communications Security, CCS 2009 pp. 235–245 (2009)

    Google Scholar 

  5. Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behavior. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS 2012, pp. 3:1–3:14 (2012)

    Google Scholar 

  6. Frank, M., Dong, B., Porter Felt, A., Song, D.: Mining permission request patterns from android and facebook applications. In: Proceedings of the 2012 IEEE 12th International Conference on Data Mining, ICDM 2012, pp. 870–875. IEEE Computer Society, Washington, DC (2012)

    Google Scholar 

  7. Liang, S., Du, X.: Permission-combination-based scheme for android mobile malware detection. In: IEEE International Conference on Communications (ICC), pp. 2301–2306. IEEE (2014)

    Google Scholar 

  8. Moonsamy, V., Rong, J., Liu, S.: Mining permission patterns for contrasting clean and malicious android applications. Future Gener. Comput. Syst. 36, 122–132 (2014)

    Article  Google Scholar 

  9. Sarma, B.P., Li, N., Gates, C., Potharaju, R., Nita-Rotaru, C., Molloy, I.: Android permissions: a perspective combining risks and benefits. In: Proceedings of the 17th ACM symposium on Access Control Models and Technologies, SACMAT 2012 pp. 13–22 (2012)

    Google Scholar 

  10. Wang, Y., Zheng, J., Sun, C., Mukkamala, S.: Quantitative security risk assessment of android permissions and applications. In: Wang, L., Shafiq, B. (eds.) DBSec 2013. LNCS, vol. 7964, pp. 226–241. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  11. Xu, W., Zhang, F., Zhu, S.: Permlyzer: analyzing permission usage in android applications. In: ISSRE, pp. 400–410. IEEE (2013)

    Google Scholar 

  12. Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: Proceedings of the 33rd IEEE Symposium on Security and Privacy, Oakland 2012, pp. 95–109 (2012)

    Google Scholar 

  13. Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, you, get off my market: detecting malicious apps in official and alternative android markets. In: Proceedings of the 19th Network and Distributed System Security Symposium, NDSS (2012)

    Google Scholar 

Download references

Acknowledgments

This work was supported in part by the U.S. Department of Homeland Security under Award Number: “2010-ST-062-000051” and the Institute of Complex Additive Systems Analysis (ICASA) of New Mexico Tech.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jun Zheng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Wang, Y., Watson, B., Zheng, J., Mukkamala, S. (2015). ARP-Miner: Mining Risk Patterns of Android Malware. In: Bikakis, A., Zheng, X. (eds) Multi-disciplinary Trends in Artificial Intelligence. MIWAI 2015. Lecture Notes in Computer Science(), vol 9426. Springer, Cham. https://doi.org/10.1007/978-3-319-26181-2_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-26181-2_34

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-26180-5

  • Online ISBN: 978-3-319-26181-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics