Malware Analysis in IoT & Android Systems with Defensive Mechanism

被引:12
|
作者
Yadav, Chandra Shekhar [1 ]
Singh, Jagendra [2 ]
Yadav, Aruna [2 ]
Pattanayak, Himansu Sekhar [2 ]
Kumar, Ravindra [3 ]
Khan, Arfat Ahmad [4 ]
Haq, Mohd Anul [5 ]
Alhussen, Ahmed [6 ]
Alharby, Sultan [5 ]
机构
[1] MeitY, Standardisat Testing & Qual Certificat, Delhi 110003, India
[2] Bennett Univ, Sch Comp Sci Engn & Technol, Greater Noida 201310, India
[3] Galgotias Coll Engn & Technol, CSE Dept, Greater Noida 201310, India
[4] Khon Kaen Univ, Coll Comp, Khon Kaen 40000, Thailand
[5] Majmaah Univ, Coll Comp & Informat Sci, Dept Comp Sci, Al Majmaah 11952, Saudi Arabia
[6] Majmaah Univ, Coll Comp Sci & Informat Sci, Dept Comp Engn, Al Majmaah 11952, Saudi Arabia
关键词
IoT; android system; malware; kernel-based attack; application attack; application hardening technique;
D O I
10.3390/electronics11152354
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) and the Android operating system have made cutting-edge technology accessible to the general public. These are affordable, easy-to-use, and open-source technology. Android devices connect to different IoT devices such as IoT-enabled cameras, Alexa powered by Amazon, and various other sensors. Due to the escalated growth of Android devices, users are facing cybercrime through their Android devices. This article aims to provide a comprehensive study of the IoT and Android systems. This article classifies different attacks on IoT and Android devices and mitigation strategies proposed by different researchers. The article emphasizes the role of the developer in secure application design. This article attempts to provide a relative analysis of several malware detection methods in the different environments of attacks. This study expands the awareness of certain application-hardening strategies applicable to IoT devices and Android applications and devices. This study will help domain experts and researchers to gain knowledge of IoT systems and Android systems from a security point of view and provide insight into how to design more efficient, robust, and comprehensive solutions. This article discusses different attack vectors and mitigation strategies available to both developers and in the open domain. Certain guidelines are also suggested for application and platform developers, as well as application databases (Google play store), to limit the risk of attack, and users can form their own defense with knowledge regarding keeping hardware and software updated and securing their system with a strong password.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] A Review on Malware Analysis for IoT and Android System
    Yadav C.S.
    Gupta S.
    [J]. SN Computer Science, 4 (2)
  • [2] Adversarial Samples on Android Malware Detection Systems for IoT Systems
    Liu, Xiaolei
    Du, Xiaojiang
    Zhang, Xiaosong
    Zhu, Qingxin
    Wang, Hao
    Guizani, Mohsen
    [J]. SENSORS, 2019, 19 (04)
  • [3] Malware Detection in Android IoT Systems Using Deep Learning
    Waqar, Muhammad
    Fareed, Sabeeh
    Kim, Ajung
    Malik, Saif Ur Rehman
    Imran, Muhammad
    Yaseen, Muhammad Usman
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (02): : 4399 - 4415
  • [4] Dynamic IoT Malware Detection in Android Systems Using Profile Hidden Markov Models
    Abanmi, Norah
    Kurdi, Heba
    Alzamel, Mai
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (01):
  • [5] IoT Malware Analysis
    Clincyl, Victor
    Shahriar, Hussain
    [J]. 2019 IEEE 43RD ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2019, : 920 - 921
  • [6] The Evolution of Android Malware and Android Analysis Techniques
    Tam, Kimberly
    Feizollah, Ali
    Anuar, Nor Badrul
    Salleh, Rosli
    Cavallaro, Lorenzo
    [J]. ACM COMPUTING SURVEYS, 2017, 49 (04)
  • [7] Android Platform Malware Analysis
    Alfalqi, Khalid
    Alghamdi, Rubayyi
    Waqdan, Mofareh
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (01) : 140 - 146
  • [8] Challenges in Android Malware Analysis
    Tong, Valerie Viet Triem
    Lalande, Jean Francois
    Leslous, Mourad
    [J]. ERCIM NEWS, 2016, (106): : 42 - +
  • [9] The Analysis of Android Malware Behaviors
    Fan Yuhui
    Xu Ning
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 335 - 345
  • [10] Framework for malware analysis in Android
    Urcuqui Lopez, Christian Camilo
    Navarro Cadavid, Andres
    [J]. SISTEMAS & TELEMATICA, 2016, 14 (37): : 45 - 56