Neural Visualization of Android Malware Families
- 1.2k Downloads
Due to the ever increasing amount and severity of attacks aimed at compromising smartphones in general, and Android devices in particular, much effort have been devoted in recent years to deal with such incidents. However, scant attention has been devoted to study the interplay between visualization techniques and Android malware detection. As an initial proposal, neural projection architectures are applied in present work to analyze malware apps data and characterize malware families. By the advanced and intuitive visualization, the proposed solution provides with an overview of the structure of the families dataset and ease the analysis of their internal organization. Dimensionality reduction based on unsupervised neural networks is performed on family information from the Android Malware Genome (Malgenome) dataset.
KeywordsAndroid malware Malware families Artificial neural networks Exploratory projection pursuit
- 3.Micro, T.: The Fine Line: 2016 Trend Micro Security Predictions (2015)Google Scholar
- 5.Yajin, Z., Xuxian, J.: Dissecting android malware: characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy, pp. 95–109 (2012)Google Scholar
- 11.Arshad, S., Khan, A., Shah, M.A., Ahmed, M.: Android malware detection & protection: a survey. Int. J. Adv. Comput. Sci. Appl. 7, 463–475 (2016)Google Scholar
- 16.Wagner, M., Fischer, F., Luh, R., Haberson, A., Rind, A., Keim, D.A., Aigner, W.: A survey of visualization systems for malware analysis. In: EG Conference on Visualization (EuroVis)-STARs, pp. 105–125 (2015)Google Scholar
- 17.Paturi, A., Cherukuri, M., Donahue, J., Mukkamala, S.: Mobile malware visual analytics and similarities of attack toolkits (malware gene analysis). In: 2013 International Conference on Collaboration Technologies and Systems (CTS), pp. 149–154 (2013)Google Scholar
- 18.Park, W., Lee, K.H., Cho, K.S., Ryu, W.: Analyzing and detecting method of android malware via disassembling and visualization. In: 2014 International Conference on Information and Communication Technology Convergence (ICTC), pp. 817–818 (2014)Google Scholar
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 2.5 International License (http://creativecommons.org/licenses/by-nc/2.5/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.