An Analysis of Android Malware Behavior

被引:1
|
作者
Singh, Gagandeep [1 ]
Jaafar, Fehmi [2 ,3 ]
Zavarsky, Pavol [2 ]
机构
[1] Concordia Univ Edmonton, Dept Informat Syst, Assurance Management, Edmonton, AB, Canada
[2] Concordia Univ Edmonton, Dept Informat Syst, Secur Management, Edmonton, AB, Canada
[3] Comp Res Inst Montreal, Montreal, PQ, Canada
关键词
Android permissions; CPU usage; Android malware; traffic analysis; malformed packets;
D O I
10.1109/QRS-C.2018.00091
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Android is dominating the smartphone market with more users than any other mobile operating system. But with its growing popularity, interest from attackers has also increased, as the number of malicious applications keeps on rising. To know more about these applications, investigation of their behavior has become very important. In our paper, we present a study that combines static and dynamic analysis of these applications with an aim to analyze their behavior by examining various attributes such as permission, CPU usage, volatile memory, and traffic. The experimental result of the static analysis shows that top permissions are used by malware to access network state, Internet, write external phone state, and read phone state. Our results of runtime experiments show that CPU usage of malicious applications is on average half that of normal applications while in terms of volatile memory usage malicious applications occupied more RAM than legitimate ones. Traffic analysis includes transmission rate between endpoints which is higher in malware compared to normal applications with a higher number of malformed packets. Based on the above mentioned four attributes, the behavior of malware can be understood and this behavior can assist in differentiating malicious apps from legitimate applications.
引用
收藏
页码:505 / 512
页数:8
相关论文
共 50 条
  • [41] Analysis of Clustering Technique in Android Malware Detection
    Abu Samra, Aiman A.
    Yim, Kangbin
    Ghanem, Osama A.
    [J]. 2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013), 2013, : 729 - 733
  • [42] MAMA: MANIFEST ANALYSIS FOR MALWARE DETECTION IN ANDROID
    Sanz, Borja
    Santos, Igor
    Laorden, Carlos
    Ugarte-Pedrero, Xabier
    Nieves, Javier
    Bringas, Pablo G.
    Alvarez Maranon, Gonzalo
    [J]. CYBERNETICS AND SYSTEMS, 2013, 44 (6-7) : 469 - 488
  • [43] Android Malware Detection Using Permission Analysis
    Shahriar, Hossain
    Islam, Mahbubul
    Clincy, Victor
    [J]. SOUTHEASTCON 2017, 2017,
  • [44] Malware Detection in Android by Network Traffic Analysis
    Zaman, Mehedee
    Siddiqui, Tazrian
    Amin, Mohammad Rakib
    Hossain, Md Shohrab
    [J]. 2015 INTERNATIONAL CONFERENCE ON NETWORKING SYSTEMS AND SECURITY (NSYSS), 2015, : 183 - 187
  • [45] Android malware analysis and detection: A systematic review
    Dahiya, Anuradha
    Singh, Sukhdip
    Shrivastava, Gulshan
    [J]. EXPERT SYSTEMS, 2023, 42 (01)
  • [46] Machine Learning Classifiers for Android Malware Analysis
    Urcuqui Lopez, Christian Camilo
    Navarro Cadavid, Andres
    [J]. 2016 IEEE COLOMBIAN CONFERENCE ON COMMUNICATIONS AND COMPUTING (COLCOM), 2016,
  • [47] Forensic Analysis on Joker Family Android Malware
    Shi, Chen
    Cheng, Chris Chao-Chun
    Guan, Yong
    [J]. 2021 17TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB 2021), 2021, : 403 - 406
  • [48] Comparative Analysis of Android Malware Detection Techniques
    Painter, Nishant
    Kadhiwala, Bintu
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA ENGINEERING AND COMMUNICATION TECHNOLOGY, ICDECT 2016, VOL 2, 2017, 469 : 131 - 139
  • [49] A Review on Malware Analysis for IoT and Android System
    Yadav C.S.
    Gupta S.
    [J]. SN Computer Science, 4 (2)
  • [50] A3: Automatic Analysis of Android Malware
    Zhang, Luoshi
    Niu, Yan
    Wu, Xiao
    Wang, Zhaoguo
    Xue, Yibo
    [J]. PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 89 - 93