Skip to main content

2018 | OriginalPaper | Buchkapitel

Permission-Set Based Detection and Analysis of Android Malware

verfasst von : Aditi Sharma, Amit Doegar

Erschienen in: Cyber Security

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Smartphone industry has become one of the fastest growing technological areas in the past few years. The monotonic growth of Android share market and the diversity among various app sources besides official Google Play Store has attracted attention of malware attacker. To tackle with the problem of increasing number of malicious Android app available at various sources, this paper proposes a novel approach which is based on feature similarity of Android apps. This approach has been implemented by performing static analysis to extract the features from an APK file. Extracted features are useful and meaningful to make efficient training system. This paper proposes a permission-based model which makes use of self-organizing map algorithm. The implemented approach has been analyzed using 1200 heterogeneous Android apps. The proposed approach shows improved results for TPR, FPR, and accuracy.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Idika N, Mathur AP (2007) A survey of malware detection techniques. Department of Computer Science, Purdue University, West Lafayette, IN 47907, pp 1–48, Feb 2007 Idika N, Mathur AP (2007) A survey of malware detection techniques. Department of Computer Science, Purdue University, West Lafayette, IN 47907, pp 1–48, Feb 2007
2.
Zurück zum Zitat Sharma A, Doegar A (2015) Review of malware detection and analysis for android environment using data mining techniques. In: Proceedings of national conference on computing technologies, national institute of technical teachers training and research, Chandigarh, CT31, pp 30–31, Mar 2015 Sharma A, Doegar A (2015) Review of malware detection and analysis for android environment using data mining techniques. In: Proceedings of national conference on computing technologies, national institute of technical teachers training and research, Chandigarh, CT31, pp 30–31, Mar 2015
3.
Zurück zum Zitat Cooper VN, Shahriar H, Haddad HM (2014) A survey of android malware characteristics and mitigation techniques. In: Proceedings of 11th IEEE international conference on InfoTech: new generations, USA, pp 327–332 Cooper VN, Shahriar H, Haddad HM (2014) A survey of android malware characteristics and mitigation techniques. In: Proceedings of 11th IEEE international conference on InfoTech: new generations, USA, pp 327–332
4.
Zurück zum Zitat Thanh HL (2013) Analysis of malware families on android mobiles: detection characteristics recognizable by ordinary phone users and how to fix it. J Inf Secur (JIS) 4(4):213–224 Thanh HL (2013) Analysis of malware families on android mobiles: detection characteristics recognizable by ordinary phone users and how to fix it. J Inf Secur (JIS) 4(4):213–224
5.
Zurück zum Zitat Zhou Y, Jiang X (2012) Dissecting android malware: characterization an evolution. IEEE Symposium on Security and Privacy, San Francisco, pp 95–109 Zhou Y, Jiang X (2012) Dissecting android malware: characterization an evolution. IEEE Symposium on Security and Privacy, San Francisco, pp 95–109
6.
Zurück zum Zitat Felt AP, Finifter M, Chin E, Hanna S, Wagner D (2011) A survey of mobile malware in the wild. In: Proceedings of 1st ACM conference of security and privacy in smartphone and mobile devices (SPSM), USA, pp 3–14 Felt AP, Finifter M, Chin E, Hanna S, Wagner D (2011) A survey of mobile malware in the wild. In: Proceedings of 1st ACM conference of security and privacy in smartphone and mobile devices (SPSM), USA, pp 3–14
7.
Zurück zum Zitat Liu X, Liu J (2014) A two-layered permission-based android malware detection scheme. In: Proceedings of 2nd IEEE international conference on mobile cloud computing, services, and engineering, UK, pp 142–148 Liu X, Liu J (2014) A two-layered permission-based android malware detection scheme. In: Proceedings of 2nd IEEE international conference on mobile cloud computing, services, and engineering, UK, pp 142–148
8.
Zurück zum Zitat Sanz B, Santos I, Laorden C, Ugarte-Pedrero C, Bringas PG, Álvarez G (2013) PUMA: permission usage to detect malware in android. In: International joint conference, vol 189, no 1. Heidelberg, pp 289–298 Sanz B, Santos I, Laorden C, Ugarte-Pedrero C, Bringas PG, Álvarez G (2013) PUMA: permission usage to detect malware in android. In: International joint conference, vol 189, no 1. Heidelberg, pp 289–298
9.
Zurück zum Zitat Barrera D, OOrschot PCV, Kayacil HG, Somayaji A (2010) A methodology for empirical analysis of permission-based security models and its applications to android. In: Proceedings of the 17th ACM conference on computer and communication security (CSS), USA, pp 73–84, Oct 2010 Barrera D, OOrschot PCV, Kayacil HG, Somayaji A (2010) A methodology for empirical analysis of permission-based security models and its applications to android. In: Proceedings of the 17th ACM conference on computer and communication security (CSS), USA, pp 73–84, Oct 2010
14.
Zurück zum Zitat Wu DJ, Mao CH, Wei TE, Lee HM, Wu KP (2012) DroidMat: android malware detection through manifest and API calls tracing. In: Proceedings of 7th Asia joint conference on information security, Tokyo, pp 66–69, Aug 2012 Wu DJ, Mao CH, Wei TE, Lee HM, Wu KP (2012) DroidMat: android malware detection through manifest and API calls tracing. In: Proceedings of 7th Asia joint conference on information security, Tokyo, pp 66–69, Aug 2012
Metadaten
Titel
Permission-Set Based Detection and Analysis of Android Malware
verfasst von
Aditi Sharma
Amit Doegar
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-8536-9_23