Android Malicious Application Detection Using Permission Vector and Network Traffic Analysis

被引:0
|
作者
Kandukuru, Satish [1 ]
Sharma, R. M. [1 ]
机构
[1] Natl Inst Technol, Dept Comp Engn, Kurukshetra, Haryana, India
关键词
Smartphone; Android operating system; Malware; Detection; Network traffic analysis and Permissions;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In this technology world, smartphones are greatly adopted by people due to the need of personal communication, Internet and many more requirements. Users are attracted to use the android operating system due its availability for low-cost and millions of freely available applications. The popularity of android operating system is also welcomes the attackers. Statistics have shown that, the growth of android malware is becomes double by every year. Hence android platform is more vulnerable to malwares. Researchers are proposed various models. Some of these models are completely fail to detect unseen variants of malware, while remaining models are inefficient to detect new malware families. In this paper, we briefly explain about android architecture, structure of android application and also characterized android malware based on their installation, activation and payloads types. We proposed a hybrid model to detect the malware based on permission bit-vector and network traffic. We constructed a decision tree classifier to detect the android malware. Our results show that combination of permission bit-vector and network traffic analysis is highly efficient by achieved 95.56% of detection accuracy.
引用
收藏
页码:1126 / 1132
页数:7
相关论文
共 50 条
  • [1] Permission Sensitivity-Based Malicious Application Detection for Android
    Song, Yubo
    Geng, Yijin
    Wang, Junbo
    Gao, Shang
    Shi, Wei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [2] Discovering Persuaded Risk of Permission in Android Applications for Malicious Application Detection
    Singh, Pooja
    Singh, Santosh
    Tiwari, Pankaj
    [J]. 2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 922 - 926
  • [3] Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection
    Wang, Wei
    Wang, Xing
    Feng, Dawei
    Liu, Jiqiang
    Han, Zhen
    Zhang, Xiangliang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (11) : 1869 - 1882
  • [4] Detection of Malicious Network Traffic Attacks Using Support Vector Machine
    Dwivedi, Devanshi
    Bhushan, Aditya
    Singh, Ashutosh Kumar
    Snehlata
    [J]. ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2023, PT II, 2024, 2091 : 54 - 68
  • [5] Android Malicious Application Detection Using Support Vector Machine and Active Learning
    Rashidi, Bahman
    Fung, Carol
    Bertino, Elisa
    [J]. 2017 13TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2017,
  • [6] Malicious Application Traffic Detection and Identification for Mobile Android Devices
    Niu, Geng
    [J]. INFORMATICA-AN INTERNATIONAL JOURNAL OF COMPUTING AND INFORMATICS, 2022, 46 (08): : 67 - 72
  • [7] Malicious Application Traffic Detection and Identification for Mobile Android Devices
    Niu, Geng
    [J]. Informatica (Slovenia), 2022, 46 (08): : 67 - 72
  • [8] Android Malware Detection Using Permission Analysis
    Shahriar, Hossain
    Islam, Mahbubul
    Clincy, Victor
    [J]. SOUTHEASTCON 2017, 2017,
  • [9] Detection of malicious behavior in android apps through API calls and permission uses analysis
    Yang, Ming
    Wang, Shan
    Ling, Zhen
    Liu, Yaowen
    Ni, Zhenyu
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (19):
  • [10] Hybrid Detection Using Permission Analysis for Android Malware
    Jiao, Haofeng
    Li, Xiaohong
    Zhang, Lei
    Xu, Guangquan
    Feng, Zhiyong
    [J]. INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 541 - 545