SensDroid: Analysis for Malicious Activity Risk of Android Application

被引:13
|
作者
Shrivastava, Gulshan [1 ]
Kumar, Prabhat [1 ]
机构
[1] Natl Inst Technol Patna, Dept Comp Sci & Engn, Patna, Bihar, India
关键词
Android analysis; Data leak assessment; Intent analysis; Permission analysis; Android application clustering; Security and privacy; MALWARE; CLASSIFICATION;
D O I
10.1007/s11042-019-07899-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Android, the inter-communication structure is governed by a late runtime binding message called Intent. Intents are having rich features which can detect the true nature of malware when compared to another known trait such as permissions. In this work, a framework called SensDroid is formulated that evaluates the efficiency of android intents and permissions as a differentiating trait to spot malicious apps through sensitive analysis technique. Efficiency escalation has been achieved by integrating these traits with other well-known malware detection attributes. The proposed work also uses sufficient number of samples collected from official and third-party Android app market. Multiple parameters are evaluated and compared with the existing techniques. Successful categorization of clean and malware app with high identification rate has been achieved. As a background discussion, we also give a comprehensive review of ancient android application analysis techniques, risk identification techniques, and intent analysis techniques for contemporary malicious activity.
引用
收藏
页码:35713 / 35731
页数:19
相关论文
共 50 条
  • [21] Study on the Application of Dalvik Injection Technique for the Detection of Malicious Programs in Android
    Li, Yingbo
    Fang, Jing
    Liu, Cheng
    Liu, Mengrong
    Wu, ShaoHua
    [J]. PROCEEDINGS OF 2015 IEEE 5TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION, 2015, : 309 - 312
  • [22] Extracting Android Malicious Behaviors
    Khanh-Huu-The Dam
    Touili, Tayssir
    [J]. ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 714 - 723
  • [23] A MACHINE LEARNING APPROACH TO THE DETECTION AND ANALYSIS OF ANDROID MALICIOUS APPS
    Shibija, K.
    Raymond, Joseph, V
    [J]. 2018 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2018,
  • [24] LSTM Android Malicious Behavior Analysis Based on Feature Weighting
    Yang, Qing
    Wang, Xiaoliang
    Zheng, Jing
    Ge, Wenqi
    Bai, Ming
    Jiang, Frank
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (06): : 2188 - 2203
  • [25] Familial Analysis of Malicious Android Apps Controlling IOT Devices
    Maikap, Subhadhriti
    Kishore, Pushkar
    Barisal, Swadhin Kumar
    Mohapatra, Durga Prasad
    [J]. INTERNET OF THINGS AND CONNECTED TECHNOLOGIES, 2022, 340 : 205 - 214
  • [26] A New Android Malicious Application Detection Method Using Feature Importance Score
    Xiao, Jing-xu
    Lu, Zi-cong
    Xu, Qi-han
    [J]. PROCEEDINGS OF 2018 THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ARTIFICIAL INTELLIGENCE (CSAI 2018) / 2018 THE 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND MULTIMEDIA TECHNOLOGY (ICIMT 2018), 2018, : 145 - 150
  • [27] An Android Malicious Application Detection Method with Decision Mechanism in the Operating Environment of Blockchain
    Li, Xingyu
    Zhao, Zongqu
    Tang, Yongli
    Zhang, Jing
    Wu, Chengyi
    Li, Ying
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [28] Evading android anti-malware by hiding malicious application inside images
    Badhani, Shikha
    Muttoo, Sunil K.
    [J]. INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2018, 9 (02) : 482 - 493
  • [29] Learning-Based Detection for Malicious Android Application Using Code Vectorization
    Liu, Lin
    Ren, Wang
    Xie, Feng
    Yi, Shengwei
    Yi, Junkai
    Jia, Peng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [30] Detection malicious Android application based on simple-Dalvik intermediate language
    Qi Li
    Bowen Sun
    Meiqi Chen
    Hang Dong
    [J]. Neural Computing and Applications, 2019, 31 : 185 - 194