Visible to the public Detecting mobile botnets through machine learning and system calls analysis

TitleDetecting mobile botnets through machine learning and system calls analysis
Publication TypeConference Paper
Year of Publication2017
AuthorsCosta, V. G. T. da, Barbon, S., Miani, R. S., Rodrigues, J. J. P. C., Zarpelão, B. B.
Conference Name2017 IEEE International Conference on Communications (ICC)
ISBN Number978-1-4673-8999-0
Keywordsanomalous behavior identification, anomaly-based approach, botnets, close-to-reality scenario, compositionality, computer network security, desktop domain, feature extraction, host-based approach, Internet, Internet security, invasive software, learning (artificial intelligence), legitimate application, machine learning, machine learning algorithms, Malware, Metrics, mobile botnet detection, Mobile communication, mobile computing, mobile environment, Mobile handsets, Monitoring, pattern detection, pubcrawl, Resiliency, self-generated dataset, statistical analysis, statistical feature extraction, system call analysis, threat minimization
Abstract

Botnets have been a serious threat to the Internet security. With the constant sophistication and the resilience of them, a new trend has emerged, shifting botnets from the traditional desktop to the mobile environment. As in the desktop domain, detecting mobile botnets is essential to minimize the threat that they impose. Along the diverse set of strategies applied to detect these botnets, the ones that show the best and most generalized results involve discovering patterns in their anomalous behavior. In the mobile botnet field, one way to detect these patterns is by analyzing the operation parameters of this kind of applications. In this paper, we present an anomaly-based and host-based approach to detect mobile botnets. The proposed approach uses machine learning algorithms to identify anomalous behaviors in statistical features extracted from system calls. Using a self-generated dataset containing 13 families of mobile botnets and legitimate applications, we were able to test the performance of our approach in a close-to-reality scenario. The proposed approach achieved great results, including low false positive rates and high true detection rates.

URLhttps://ieeexplore.ieee.org/document/7997390
DOI10.1109/ICC.2017.7997390
Citation Keycosta_detecting_2017