Malware Analysis in IoT & Android Systems with Defensive Mechanism

被引:12
|
作者
Yadav, Chandra Shekhar [1 ]
Singh, Jagendra [2 ]
Yadav, Aruna [2 ]
Pattanayak, Himansu Sekhar [2 ]
Kumar, Ravindra [3 ]
Khan, Arfat Ahmad [4 ]
Haq, Mohd Anul [5 ]
Alhussen, Ahmed [6 ]
Alharby, Sultan [5 ]
机构
[1] MeitY, Standardisat Testing & Qual Certificat, Delhi 110003, India
[2] Bennett Univ, Sch Comp Sci Engn & Technol, Greater Noida 201310, India
[3] Galgotias Coll Engn & Technol, CSE Dept, Greater Noida 201310, India
[4] Khon Kaen Univ, Coll Comp, Khon Kaen 40000, Thailand
[5] Majmaah Univ, Coll Comp & Informat Sci, Dept Comp Sci, Al Majmaah 11952, Saudi Arabia
[6] Majmaah Univ, Coll Comp Sci & Informat Sci, Dept Comp Engn, Al Majmaah 11952, Saudi Arabia
关键词
IoT; android system; malware; kernel-based attack; application attack; application hardening technique;
D O I
10.3390/electronics11152354
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) and the Android operating system have made cutting-edge technology accessible to the general public. These are affordable, easy-to-use, and open-source technology. Android devices connect to different IoT devices such as IoT-enabled cameras, Alexa powered by Amazon, and various other sensors. Due to the escalated growth of Android devices, users are facing cybercrime through their Android devices. This article aims to provide a comprehensive study of the IoT and Android systems. This article classifies different attacks on IoT and Android devices and mitigation strategies proposed by different researchers. The article emphasizes the role of the developer in secure application design. This article attempts to provide a relative analysis of several malware detection methods in the different environments of attacks. This study expands the awareness of certain application-hardening strategies applicable to IoT devices and Android applications and devices. This study will help domain experts and researchers to gain knowledge of IoT systems and Android systems from a security point of view and provide insight into how to design more efficient, robust, and comprehensive solutions. This article discusses different attack vectors and mitigation strategies available to both developers and in the open domain. Certain guidelines are also suggested for application and platform developers, as well as application databases (Google play store), to limit the risk of attack, and users can form their own defense with knowledge regarding keeping hardware and software updated and securing their system with a strong password.
引用
收藏
页数:20
相关论文
共 50 条
  • [41] Linear SVM-Based Android Malware Detection for Reliable IoT Services
    Ham, Hyo-Sik
    Kim, Hwan-Hee
    Kim, Myung-Sup
    Choi, Mi-Jung
    [J]. JOURNAL OF APPLIED MATHEMATICS, 2014,
  • [42] HAAMD:Hybrid Analysis for Android Malware Detection
    Choudhary, Mahima
    Kishore, Brij
    [J]. 2018 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2018,
  • [43] Android Malware Detection: An Eigenspace Analysis Approach
    Yerima, Suleiman Y.
    Sezer, Sakir
    Muttik, Igor
    [J]. 2015 SCIENCE AND INFORMATION CONFERENCE (SAI), 2015, : 1236 - 1242
  • [44] DAMBA: Detecting Android Malware by ORGB Analysis
    Zhang, Weizhe
    Wang, Huanran
    He, Hui
    Liu, Peng
    [J]. IEEE TRANSACTIONS ON RELIABILITY, 2020, 69 (01) : 55 - 69
  • [45] Malware Detection in Android based on Dynamic Analysis
    Bhatia, Taniya
    Kaushal, Rishabh
    [J]. 2017 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2017,
  • [46] The Android malware detection systems between hope and reality
    Khaled Bakour
    Halil Murat Ünver
    Razan Ghanem
    [J]. SN Applied Sciences, 2019, 1
  • [47] The Android malware detection systems between hope and reality
    Bakour, Khaled
    Unver, Halil Murat
    Ghanem, Razan
    [J]. SN APPLIED SCIENCES, 2019, 1 (09)
  • [48] Evading Machine-Learning-Based Android Malware Detector for IoT Devices
    Renjith, G.
    Vinod, P.
    Aji, S.
    [J]. IEEE SYSTEMS JOURNAL, 2023, 17 (02): : 2745 - 2755
  • [49] Android Malware Detection Using Permission Analysis
    Shahriar, Hossain
    Islam, Mahbubul
    Clincy, Victor
    [J]. SOUTHEASTCON 2017, 2017,
  • [50] Analysis of Clustering Technique in Android Malware Detection
    Abu Samra, Aiman A.
    Yim, Kangbin
    Ghanem, Osama A.
    [J]. 2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013), 2013, : 729 - 733