Android Malicious Application Detection Using Permission Vector and Network Traffic Analysis

被引:0
|
作者
Kandukuru, Satish [1 ]
Sharma, R. M. [1 ]
机构
[1] Natl Inst Technol, Dept Comp Engn, Kurukshetra, Haryana, India
关键词
Smartphone; Android operating system; Malware; Detection; Network traffic analysis and Permissions;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In this technology world, smartphones are greatly adopted by people due to the need of personal communication, Internet and many more requirements. Users are attracted to use the android operating system due its availability for low-cost and millions of freely available applications. The popularity of android operating system is also welcomes the attackers. Statistics have shown that, the growth of android malware is becomes double by every year. Hence android platform is more vulnerable to malwares. Researchers are proposed various models. Some of these models are completely fail to detect unseen variants of malware, while remaining models are inefficient to detect new malware families. In this paper, we briefly explain about android architecture, structure of android application and also characterized android malware based on their installation, activation and payloads types. We proposed a hybrid model to detect the malware based on permission bit-vector and network traffic. We constructed a decision tree classifier to detect the android malware. Our results show that combination of permission bit-vector and network traffic analysis is highly efficient by achieved 95.56% of detection accuracy.
引用
收藏
页码:1126 / 1132
页数:7
相关论文
共 50 条
  • [41] SensDroid: Analysis for Malicious Activity Risk of Android Application
    Shrivastava, Gulshan
    Kumar, Prabhat
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (24) : 35713 - 35731
  • [42] Malicious code detection for Android using Instruction Signatures
    Hu Ge
    Li Ting
    Dong Hang
    Yu Hewei
    Zhang Miao
    [J]. 2014 IEEE 8TH INTERNATIONAL SYMPOSIUM ON SERVICE ORIENTED SYSTEM ENGINEERING (SOSE), 2014, : 332 - 337
  • [43] Android Malicious Application Detection Based on Improved Mayfly Algorithm
    Wei, Yinzhen
    Lu, Shuo
    [J]. 2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1845 - 1852
  • [44] Early web application attack detection using network traffic analysis
    Rajic, Branislav
    Stanisavljevic, Zarko
    Vuletic, Pavle
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (01) : 77 - 91
  • [45] Early web application attack detection using network traffic analysis
    Branislav Rajić
    Žarko Stanisavljević
    Pavle Vuletić
    [J]. International Journal of Information Security, 2023, 22 : 77 - 91
  • [46] Learning Invariant Representation for Malicious Network Traffic Detection
    Bartos, Karel
    Sofka, Michal
    Franc, Vojtech
    [J]. ECAI 2016: 22ND EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2016, 285 : 1132 - 1139
  • [47] Automatic detection of inter-application permission leaks in Android applications
    Sbielea, D.
    Burke, M. G.
    Guarnieri, S.
    Pistoia, M.
    Sarkar, V.
    [J]. IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2013, 57 (06)
  • [48] Intelligent analysis of android application privacy policy and permission consistency
    Tu, Tengfei
    Zhang, Hua
    Gong, Bei
    Du, Daizhong
    Wen, Qiaoyan
    [J]. ARTIFICIAL INTELLIGENCE REVIEW, 2024, 57 (07)
  • [49] Real time detection of malicious DoH traffic using statistical analysis
    Moure-Garrido, Marta
    Campo, Celeste
    Garcia-Rubio, Carlos
    [J]. COMPUTER NETWORKS, 2023, 234
  • [50] On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis
    Backes, Michael
    Bugiel, Sven
    Derr, Erik
    McDaniel, Patrick
    Octeau, Damien
    Weisgerber, Sebastian
    [J]. PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, 2016, : 1101 - 1118