Author : Sadananda L 1
Date of Publication :30th November 2021
Abstract: At present, Android has gotten one of the most notable working frameworks for PDAs by virtue of different versatile applications it bolsters. In any case, the downloaded pernicious Android applications (malware) from pariah markets have inside and out undermined protection and security of the customers. The huge part of malwares remains undetected in light of the nonattendance of powerful and exact malware acknowledgment techniques. In this commitment, examine a SVM based pattern to recognize the malware for Android framework, that fuses both dangerous approval blends and unprotected API’s call and used in AI approaches. So as to test the presentation of introduced system, expansive investigations have been sorted out, that exhibited that proposed plan can perceive malicious Android applications suitably and adequately. By utilizing trial confirmation, demonstrate that SVM beats rest of the AI classifiers
Reference :
-
- W. Enck, M. Ongtang, and P. Mcdaniel, ―On lightweight mobile phone application certification,‖ in Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 235– 245, Chicago, USA, November 2009
- H. Yang, Y. Zhang, Y. Hu et al., ―Android malware detection method based on permission sequential pattern mining algorithm,‖ Journal on Communications, vol. 34, pp. 106–115, 2013C. A. Castillo, Android Malware Past, Present, and Future, Tech. rep., Mobile Working Security Group McAfee (2012).
- D. Arp, M. Spreitzenbarth, M. Hubner et al., ―Drebin: effective and explainable detection of android malware in your pocket,‖ in Proceedings of the 2014 Network and Distributed System Security Symposium (NDSS), pp. 23–26, San Diego, USA, February 2014 Android and security: Official mobile google blog, (Online; Last Accessed 15th October 2013).
- W. Enck, P. Gilbert, S. Han et al., ―TaintDroid: an information- flow tracking system for real time privacy monitoring on smartphones,‖ ACM Transactions on Computer Systems, vol. 32, no. 2, pp. 1–29, 2014
- Y. Zhang, M. Yang, B. Xu et al., ―Vetting undesirable behaviors in android apps with permission use analysis,‖ in Proceedings of the2013 ACM SIGSAC Conference on Computer & Communications Security (CCS), pp. 611–622, Berlin, Germany, November,2013AndroidHipposms, (Online; 2011)
- S. Kumar, R. Shanker, and S. Verma, ―Context aware dynamic permission model: a retrospect of privacy and security in android system,‖ in Proceedings of the International Conference on Intelligent Circuits and Systems (ICICS), pp. 324– 329, Phagwara, India, April 2018
- S. Rosen, Z. Qian, and Z. M. Mao, ―AppProfiler: a flexible method of exposing privacy-related behavior in android applications to end users,‖ in Proceedings of the third ACM Conference +on Data and Application Security and Privacy—CODASPY ’13, pp. 221–232, San Antonio, USA, February 2013
- O. Yildiz and I. A. Do˘gru, ―Permission-based android malware detection system using feature selection with genetic algorithm,‖ International Journal of Software Engineering and Knowledge Engineering, vol. 29, no. 2, pp. 245–262, 2019.
- R. S. Arslan, Ë™I. A. Do˘gru, N. Baris¸çi, and N. Baris¸çi, ―Permissionbased malware detection system for android using machine learning techniques,‖ International Journal of Software Engineering and Knowledge Engineering, vol. 29, no. 1, pp. 43–61, 2019
- W. Wang, X. Wang, F. Dawai, J. Liu, Z. Han, and X. Zhang, ―Exploring permission-induced risk in android applications for malicious application detection,‖ IEEE Transactions on Information Forensics and Security, vol. 9, no. 11, pp. 1869– 1882, 2014
- Baskaran B,Ralescu A. A study of android malware detection techniques and machine learning .In : Phung PH, Shen Jglass M, editors. Modern artificial intelligence and cognitive science:22-23 April 2016.Dayton, OH, USA:CEUR ;2016,. 15-23.
- X. Li, J. Liu, Y. Huo, R. Zhang, Y. Yao, 'An Android malware detection method based on Android Manifest file', International Conference on Cloud Computing and Intelligence Systems (CCIS), 2016, pp. 239-243
- N. B. Akhuseyinoglu, K. Akhuseyinoglu, 'AntiWare: An automated Android malware detection tool based on machine learning approach and official market metadata', IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), 2016, pp. 1-7.
- Shabtai, A., et al., "Andromaly": a behavioral malware detection framework for android devices. J. Intell. Inf. Syst., 2012. 38(1): p. 161-190.
- Arnold, J.O.K.W.C., Automatic Extraction of Computer Virus Signatures. In Proceedings of 4th Virus Bulletin International Conference, 1994: p. 178-184
- M.G. Schultz, E.E., F. Zadok, S.J. Stolfo, Data mining methods for detection of new malicious executables. Proceedings 2001 IEEE Symposiumon Security and Privacy. S&P 2001, 2001: p. 38-49
- Zhu, X.J.X., vEye: behavioral footprinting for self-propagating worm detection and profiling. Knowledge and Information Systems, 2009. 18(2): p. 231-262
- Jiang, Y.Z.X., Dissecting Android Malware: Characterization and Evolution. IEEE Symposium on Security and Privacy, 2012: p. 95-109.
- Burguera, I., U. Zurutuza, and S. NadjmTehrani,Crowdroid:behavior-based malwaredetection system for Android, in Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices. 2011, ACM: Chicago, Illinois, USA. p. 15-26.
- Yajin Zhou, Z.W., Wu Zhou, Xuxian Jiang, Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. network and distributed system security symposium, 2012.
- B. Sanz, I. Santos, C. Laorden, X. Ugarte- Pedrero, and P.G. Bringas. On the automatic ategorisation of android applications. In Consumer Communications and Networking Conference (CCNC), 2012 IEEE, pages 149–153, Jan 2012.
- P.P.K. Chan and Wen-Kai Song. Static detection of android malware by using permissions and api calls. In Machine Learning and Cybernetics (ICMLC), 2014 International Conference on, volume 1, pages 82–87, July 2014.
- Ideses and A. Neuberger. Adware detection and privacy control in mobile devices. In Electrical Electronics Engineers in Israel (IEEEI), 2014 IEEE 28th Convention of, pages 1–5, Dec 2014.