Journal on Communications ›› 2018, Vol. 39 ›› Issue (6): 27-36.doi: 10.11959/j.issn.1000-436x.2018095

• Papers • Previous Articles     Next Articles

Android collusion attack detection model

Hongyu YANG,Zaiming WANG   

  1. School of Computer Science and Technology,Civil Aviation University of China,Tianjin 300300,China
  • Revised:2018-01-03 Online:2018-06-01 Published:2018-07-09
  • Supported by:
    The National Science and Technology Major Project(2012ZX0300200);The Science & Technology Project of CAAC(MHRD201009);The Science & Technology Project of CAAC(MHRD201205)

Abstract:

In order to solve the problem of poor efficiency and low accuracy of Android collusion detection,an Android collusion attack model based on component communication was proposed.Firstly,the feature vector set was extracted from the known applications and the feature vector set was generated.Secondly,the security policy rule set was generated through training and classifying the privilege feature set.Then,the component communication finite state machine according to the component and communication mode feature vector set was generated,and security policy rule set was optimized.Finally,a new state machine was generated by extracting the unknown application’s feature vector set,and the optimized security policy rule set was matched to detect privilege collusion attacks.The experimental results show that the proposed model has better detective efficiency and higher accuracy.

Key words: Android security, collusion attack, component communication, security policy rule set, finite state machine

CLC Number: 

No Suggested Reading articles found!