Abstract
With the rapid development of mobile Internet, Android applications are used more and more in people’s daily life. While bringing convenience and making people’s life smarter, Android applications also face much serious security and privacy issues, e.g., information leakage and monetary loss caused by malware. Detection and classification of malware have thus attracted much research attention in recent years. Most current malware detection and classification approaches are based on graph-based similarity analysis (e.g., subgraph isomorphism), which is well known to be time-consuming, especially for large graphs. In this paper, we propose NSDroid, a time-efficient malware multi-classification approach based on neighborhood signature in local function call graphs (FCGs). NSDroid uses a approach based on neighborhood signature to calculate the similarity of different applications’ FCGs, which is significantly faster than traditional approaches based on subgraph isomorphism. For each node in the FCGs, NSDroid uses a fixed-length neighborhood signature to capture the caller-callee relationship between different functions and combines neighborhood signatures of all nodes to form a vector that characterizes the function call relationship in the whole application. The generated signature vector is fed into a SVM-based classifier to determine which family the malware belongs to. Experimental results on large-scale benchmarks show that, compared with state-of-the-art solutions, NSDroid reduces average detection latency by nearly \(20\times \), and meanwhile improves many evaluation index such as recall rate and others.











Similar content being viewed by others
References
Detection report: Tencent anti virus laboratory 2017 q3 security report. https://slab.qq.com/news/authority/1744.html. Accessed 2 Nov 2018
Yang, C., Xu, Z., Gu, G., Yegneswaran, V., Porras, P.: Droidminer: automated mining and characterization of fine-grained malicious behaviors in android applications. In: Proceedings of 2014 European Symposium on Research in Computer Security (ESRCS), pp. 163–182 (2014)
Hou, S., Ye, Y., Song, Y., Abdulhayoglu, M.: Hindroid: an intelligent android malware detection system based on structured heterogeneous information network. In: Proceedings of 2017 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), pp. 1507–1515. ACM (2017)
Onwuzurike, L., Mariconti, E., Andriotis, P., De Cristofaro, E., Ross, G., Stringhini, G.: Mamadroid: detecting android malware by building Markov chains of behavioral models (extended version). arXiv preprint arXiv:1711.07477 (2016)
Zhang, M., Duan, Y., Yin, H., Zhao, Z.: Semantics-aware android malware classification using weighted contextual API dependency graphs. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security(CCS), pp. 1105–1116. ACM (2014)
Suarez-Tangil, G., Tapiador, J.E., Peris-Lopez, P., Blasco, J.: Dendroid: a text mining approach to analyzing and classifying code structures in android malware families. Expert Syst. Appl. (ESA) 41(4), 1104–1117 (2014)
Jiang, X., Zhou, Y.: Dissecting android malware: characterization and evolution. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy (SP), pp. 95–109. IEEE (2012)
Fan, M., Liu, J., Luo, X., Chen, K., Chen, T., Tian, Z., Zhang, X., Zheng, Q., Liu, T.: Frequent subgraph based familial classification of android malware. In: Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering(ISSRE), pp. 24–35. IEEE (2016)
Cordella, L.P., Foggia, P., Sansone, C., Vento, M.: A (sub)graph isomorphism algorithm for matching large graphs. IEEE Trans. Pattern Anal. Mach. Intell. (TPAMI) 26(10), 1367–1372 (2004)
Sen, A.K., Bagchi, A., Zhang, W.: Average-case analysis of best-first search in two representative directed acyclic graphs. Artif. Intell. (AI) 155(1–2), 183–206 (2004)
Levin, L.A., Venkatesan, R.: An average case NP-complete graph colouring problem. Comput. Sci. 27(5), 808–828 (2002)
Zhou, W., Zhou, Y., Jiang, X., Ning, P.: Detecting repackaged smartphone applications in third-party android marketplaces. In: Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy (DASP), pp. 317–326. ACM (2012)
Deshotels, L., Notani, V., Lakhotia, A.: Droidlegacy: automated familial classification of android malware. In: Proceedings of 2014 ACM SIGPLAN on Program Protection and Reverse Engineering Workshop (PPREW), p. 3. ACM (2014)
Saracino, A., Sgandurra, D., Dini, G., Martinelli, F.: Madam: effective and efficient behavior-based android malware detection and prevention. IEEE Trans. Dependable Secure Comput. (TDSC) 15(1), 83–97 (2016)
Jang, Y., Lee, N., Kim, H., Park, S.: Design and implementation of a bloom filter-based data deduplication algorithm for efficient data management. J. Ambient Intell. Hum. Comput. (2018). https://doi.org/10.1007/s12652-018-0893-1
Hido, S., Kashima, H.: A linear-time graph kernel. In: Proceedings of the 9th IEEE International Conference on Data Mining (ICDM), pp. 179–188. IEEE (2009)
Wang, W., Gao, Z., Zhao, M., Li, Y., Liu, J., Zhang, X.: Droidensemble: detecting android malicious applications with ensemble of string and structural static features. IEEE Access 6, 31798–31807 (2018)
Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K.: CERT Siemens. Drebin: effective and explainable detection of android malware in your pocket. In: The Network and Distributed System Security Symposium (NDSS), Vol. 14, pp. 23–26. ISOC (2014)
Kirubavathi, G., Anitha, R.: Structural analysis and detection of android botnets using machine learning techniques. Int. J. Inf. Secur. (IJIS) 17(2), 153–167 (2018)
Jang, J., Kang, H., Woo, J., Mohaisen, A., Kim, H.K.: Andro-dumpsys: anti-malware system based on the similarity of malware creator and malware centric information. Comput. Secur. 58, 125–138 (2016)
Wei, F., Li, Y., Roy, S., Ou, X., Zhou, W.: Deep ground truth analysis of current android malware. In: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), pp. 252–276. Springer, Berlin (2017)
Blasing, T., Batyuk, L., Schmidt, A.-D., Camtepe, S.A., Albayrak, S.: An android application sandbox system for suspicious software detection. In: Proceedings of the 5th International Conference on Malicious and Unwanted Software(MUS), pp. 55–62. IEEE (2010)
Wang, C., Li, Z., Mo, X., Yang, H., Zhao, Y.: An android malware dynamic detection method based on service call co-occurrence matrices. Ann. Telecommun. (AT) 72(9–10), 607–615 (2017)
Wong, M.Y., Lie, D.: Intellidroid: a targeted input generator for the dynamic analysis of android malware. In: Proceedings of the 2016 ISOC Network and Distributed System Security Symposium (NDSS), vol. 16, pp. 21–24. ISOC (2016)
Ruiz-Heras, A., García-Teodoro, P., Sánchez-Casado, L.: Adroid: anomaly-based detection of malicious events in android platforms. Int. J. Inf. Secur. (IJIS) 16(4), 371–384 (2017)
Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.-G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. (TOCS) 32(2), 5 (2014)
Bai, J., Wang, W., Qin, Y., Zhang, S., Wang, J., Pan, Y.: Bridgetaint: a bi-directional dynamic taint tracking method for javascript bridges in android hybrid applications. IEEE Trans. Inf. Forensics Secur. (TIFS) 14(3), 677–692 (2019)
Dai, S., Liu, Y., Wang, T., Wei, T., Zou, W.: Behavior-based malware detection on mobile phone. In: Proceedings of the 6th International Conference on Wireless Communications Networking and Mobile Computing (WCNMC), pp. 1–4. IEEE (2010)
Isohara, T., Takemori, K., Kubota, A.: Kernel-based behavior analysis for android malware detection. In: Proceedings of the 7th International Conference on Computational Intelligence and Security (CIS), pp. 1011–1015. IEEE (2011)
Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPISM), pp. 15–26. ACM (2011)
Petsas, T., Voyatzis, G., Athanasopoulos, E., Polychronakis, M., Ioannidis, S.: Rage against the virtual machine: hindering dynamic analysis of android malware. In: Proceedings of the 7th European Workshop on System Security (EWSS), pp. 1–6. ACM (2014)
Garg, S., Peddoju, S.K., Sarje, A.K.: Network-based detection of android malicious apps. Int. J. Inf. Secur. (IJIS) 16(4), 385–400 (2017)
Miao, Q., Liu, J., Cao, Y., Song, J.: Malware detection using bilayer behavior abstraction and improved one-class support vector machines. Int. J. Inf. Secur. (IJIS) 15(4), 361–379 (2016)
Wei, F., Roy, S., Ou, X., et al.: Amandroid: a precise and general inter-component data flow analysis framework for security vetting of android apps. ACM Trans. Priv. Secur. (TOPS) 21(3), 14 (2018)
Feng, Y., Anand, S., Dillig, I., Aiken, A.: Apposcopy: semantics-based detection of android malware through static analysis. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering(FSE), pp. 576–587. ACM (2014)
Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Traon, Y.L., Octeau, D., McDaniel, P.: Flowdroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. ACM Sigplan Notices (SN) 49(6), 259–269 (2014)
Acknowledgements
We would like to thank anonymous reviewers for their comments. This work is partially supported by the National Natural Science Foundation of China under Grant No. 61672543, the Open Research Fund of Hunan Provincial Key Laboratory of Network Investigational Technology, Grant No. 2017WLZC002, the Fundamental Research Funds for the Central Universities of Central South University, Grant No. 2018zzts175.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Ethical approval
Our article does not contain any studies with human participants or animals performed by any of the authors. Every participant in our paper received informed consent.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Liu, P., Wang, W., Luo, X. et al. NSDroid: efficient multi-classification of android malware using neighborhood signature in local function call graphs. Int. J. Inf. Secur. 20, 59–71 (2021). https://doi.org/10.1007/s10207-020-00489-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-020-00489-5