An Analysis of Android Malware Behavior

作者: Fehmi Jaafar , Gagandeep Singh , Pavol Zavarsky

DOI: 10.1109/QRS-C.2018.00091

关键词: MalwareComputer securityPermissionVolatile memoryTraffic analysisAndroid (operating system)Static analysisThe InternetCPU timeComputer science

摘要: Android is dominating the smartphone market with more users than any other mobile operating system. But its growing popularity, interest from attackers has also increased, as number of malicious applications keeps on rising. To know about these applications, investigation their behavior become very important. In our paper, we present a study that combines static and dynamic analysis an aim to analyze by examining various attributes such permission, CPU usage, volatile memory, traffic. The experimental result shows top permissions are used malware access network state, Internet, write external phone read state. Our results runtime experiments show usage average half normal while in terms memory occupied RAM legitimate ones. Traffic includes transmission rate between endpoints which higher compared malformed packets. Based above-mentioned four attributes, can be understood this assist differentiating apps applications.

参考文章(10)
Jun Li, Lidong Zhai, Xinyou Zhang, Daiyong Quan, Research of android malware detection based on network traffic monitoring conference on industrial electronics and applications. pp. 1739- 1744 ,(2014) , 10.1109/ICIEA.2014.6931449
Anshul Arora, Shree Garg, Sateesh K. Peddoju, Malware Detection Using Network Traffic Analysis in Android Based Mobile Devices next generation mobile applications, services and technologies. pp. 66- 71 ,(2014) , 10.1109/NGMAST.2014.57
Deepali Kayande, Urmila Shrawankar, Performance analysis for improved RAM utilization for Android applications international conference on software engineering. pp. 1- 6 ,(2012) , 10.1109/CONSEG.2012.6349500
Patrick P. K. Chan, Wen-Kai Song, Static detection of Android malware by using permissions and API calls international conference on machine learning and cybernetics. ,vol. 1, pp. 82- 87 ,(2014) , 10.1109/ICMLC.2014.7009096
Zarni Aung, Win Zaw, Permission-Based Android Malware Detection International Journal of Scientific & Technology Research. ,vol. 2, pp. 228- 234 ,(2013)
Lizhi Peng, Zhenxiang Chen, Hongbo Han, Jin Li, Qiben Yan, Bo Yang, Lei Zhang, A First Look at Android Malware Traffic in First Few Minutes trust, security and privacy in computing and communications. ,vol. 1, pp. 206- 213 ,(2015) , 10.1109/TRUSTCOM-BIGDATASE-ISPA.2015.376
Jelena Milosevic, Alberto Ferrante, Miroslaw Malek, What does the memory say? Towards the most indicative features for efficient malware detection consumer communications and networking conference. pp. 759- 764 ,(2016) , 10.1109/CCNC.2016.7444874
Shanshan Wang, Zhenxiang Chen, Lei Zhang, Qiben Yan, Bo Yang, Lizhi Peng, Zhongtian Jia, TrafficAV: An effective and explainable detection of mobile malware behavior using network traffic international workshop on quality of service. pp. 1- 6 ,(2016) , 10.1109/IWQOS.2016.7590446
Fabricio Benevenuto, Matheus Araujo, Lucas Bastos, Joao P. Diniz, Manoel Miranda, Elias Soares, Miller Ferreira, Johnnatan Messias, Towards sentiment analysis for mobile devices advances in social networks analysis and mining. pp. 1390- 1391 ,(2016) , 10.5555/3192424.3192687
Yajin Zhou, Xuxian Jiang, Android Malware ,(2013)