Permission-Based Android Malware Detection

作者: Zarni Aung , Win Zaw

DOI:

关键词: CryptovirologyMobile deviceComputer securityMalwareWorld Wide WebComputer scienceAndroid malwareAndroid (operating system)Android applicationPermission

摘要: Mobile devices have become popular in our lives since they offer almost the same functionality as personal computers. Among them, Android-based mobile had appeared lately and, were now an ideal target for attackers. smartphone users can get free applications from Android Application Market. But, these not certified by legitimate organizations and may contain malware that steal privacy information users. In this paper, a framework detect android is propos ed to help organizing The proposed intends develop machine learning-based detection system on enhance security of This monitors various permissionbased features events obtained applications, analyses using learning classifiers classify whether application goodware or malware.

参考文章(15)
Lloyd A. Smith, Mark A. Hall, Feature subset selection: a correlation based filter approach international conference on neural information processing. pp. 855- 858 ,(1997)
G. Holmes, A. Donkin, I.H. Witten, WEKA: a machine learning workbench intelligent information systems. pp. 357- 361 ,(1994) , 10.1109/ANZIIS.1994.396988
Asaf Shabtai, Uri Kanonov, Yuval Elovici, Chanan Glezer, Yael Weiss, Andromaly: a behavioral malware detection framework for android devices intelligent information systems. ,vol. 38, pp. 161- 190 ,(2012) , 10.1007/S10844-010-0148-X
Iker Burguera, Urko Zurutuza, Simin Nadjm-Tehrani, Crowdroid Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '11. pp. 15- 26 ,(2011) , 10.1145/2046614.2046619
William Enck, Machigar Ongtang, Patrick McDaniel, On lightweight mobile phone application certification computer and communications security. pp. 235- 245 ,(2009) , 10.1145/1653662.1653691
Aubrey-Derrick Schmidt, Frank Peters, Florian Lamour, Christian Scheel, Seyit Ahmet Camtepe, Şahin Albayrak, Monitoring smartphones for anomaly detection Mobile Networks and Applications. ,vol. 14, pp. 92- 106 ,(2009) , 10.1007/S11036-008-0113-X
Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Sencun Zhu, pBMDS: a behavior-based malware detection system for cellphone devices wireless network security. pp. 37- 48 ,(2010) , 10.1145/1741866.1741874
Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David Wagner, Android permissions demystified Proceedings of the 18th ACM conference on Computer and communications security - CCS '11. pp. 627- 638 ,(2011) , 10.1145/2046707.2046779
Juan Wang, Qiren Yang, Dasen Ren, An Intrusion Detection Algorithm Based on Decision Tree Technology 2009 Asia-Pacific Conference on Information Processing. ,vol. 2, pp. 333- 335 ,(2009) , 10.1109/APCIP.2009.218
Mariantonietta La Polla, Fabio Martinelli, Daniele Sgandurra, A Survey on Security for Mobile Devices IEEE Communications Surveys and Tutorials. ,vol. 15, pp. 446- 471 ,(2013) , 10.1109/SURV.2012.013012.00028