An Analysis of Android Malware Behavior

被引:1
|
作者
Singh, Gagandeep [1 ]
Jaafar, Fehmi [2 ,3 ]
Zavarsky, Pavol [2 ]
机构
[1] Concordia Univ Edmonton, Dept Informat Syst, Assurance Management, Edmonton, AB, Canada
[2] Concordia Univ Edmonton, Dept Informat Syst, Secur Management, Edmonton, AB, Canada
[3] Comp Res Inst Montreal, Montreal, PQ, Canada
关键词
Android permissions; CPU usage; Android malware; traffic analysis; malformed packets;
D O I
10.1109/QRS-C.2018.00091
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Android is dominating the smartphone market with more users than any other mobile operating system. But with its growing popularity, interest from attackers has also increased, as the number of malicious applications keeps on rising. To know more about these applications, investigation of their behavior has become very important. In our paper, we present a study that combines static and dynamic analysis of these applications with an aim to analyze their behavior by examining various attributes such as permission, CPU usage, volatile memory, and traffic. The experimental result of the static analysis shows that top permissions are used by malware to access network state, Internet, write external phone state, and read phone state. Our results of runtime experiments show that CPU usage of malicious applications is on average half that of normal applications while in terms of volatile memory usage malicious applications occupied more RAM than legitimate ones. Traffic analysis includes transmission rate between endpoints which is higher in malware compared to normal applications with a higher number of malformed packets. Based on the above mentioned four attributes, the behavior of malware can be understood and this behavior can assist in differentiating malicious apps from legitimate applications.
引用
收藏
页码:505 / 512
页数:8
相关论文
共 50 条
  • [1] Android Malware Clustering Analysis on Network-Level Behavior
    Wang, Shanshan
    Chen, Zhenxiang
    Li, Xiaomei
    Wang, Lin
    Ji, Ke
    Zhao, Chuan
    [J]. INTELLIGENT COMPUTING THEORIES AND APPLICATION, ICIC 2017, PT I, 2017, 10361 : 796 - 807
  • [2] An Android Malware Detection System Based on Behavior Comparison Analysis
    Tao, Jing
    Zhang, Yan
    Cao, Pengfei
    Wang, Zheng
    Zhao, Qiqi
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2017, 2017, 10393 : 387 - 396
  • [3] Behavior Grouping of Android Malware Family
    Hsiao, Shun-Wen
    Sun, Yeali S.
    Chen, Meng Chang
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [4] Detection and Visualization of Android Malware Behavior
    Somarriba, Oscar
    Zurutuza, Urko
    Uribeetxeberria, Roberto
    Delosieres, Laurent
    Nadjm-Tehrani, Simin
    [J]. JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2016, 2016
  • [5] The Evolution of Android Malware and Android Analysis Techniques
    Tam, Kimberly
    Feizollah, Ali
    Anuar, Nor Badrul
    Salleh, Rosli
    Cavallaro, Lorenzo
    [J]. ACM COMPUTING SURVEYS, 2017, 49 (04)
  • [6] Android Platform Malware Analysis
    Alfalqi, Khalid
    Alghamdi, Rubayyi
    Waqdan, Mofareh
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (01) : 140 - 146
  • [7] Challenges in Android Malware Analysis
    Tong, Valerie Viet Triem
    Lalande, Jean Francois
    Leslous, Mourad
    [J]. ERCIM NEWS, 2016, (106): : 42 - +
  • [8] Framework for malware analysis in Android
    Urcuqui Lopez, Christian Camilo
    Navarro Cadavid, Andres
    [J]. SISTEMAS & TELEMATICA, 2016, 14 (37): : 45 - 56
  • [9] The Analysis of Android Malware Behaviors
    Fan Yuhui
    Xu Ning
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 335 - 345
  • [10] Android malware analysis in a nutshell
    Almomani, Iman
    Ahmed, Mohanned
    El-Shafai, Walid
    [J]. PLOS ONE, 2022, 17 (07):