An Exploration of Changes Addressed in the Android Malware Detection Walkways

作者: Rincy Raphael , P. Mathiyalagan

DOI: 10.1007/978-981-15-9700-8_6

关键词: Android (operating system)Flexibility (engineering)VulnerabilityMobile deviceTopic modelExploitMalwareSIMPLE (military communications protocol)Computer securityComputer science

摘要: Smartphone users are increasing rapidly because of the convenience and flexibility available with smartphones. Most ofthe digital transactions performed using this simple hand-held device. Android is evergreen platform for mobile operating system. The availability applications main attraction both legitimate as well vulnerability injectors. Malware malicious software perpetrators dispatch to infect individual devices. It exploits target system vulnerabilities, such a bug in android that can be hijacked activities. Various machine learning approaches applied classify Malwares from goodwares. This paper studied existing framework malware detection techniques signature, anomaly topic modelling based. proposed methods also evaluated accuracy, analysis types benefits limitations each frameworks.

参考文章(44)
Tao Xie, Rahul Pandita, William Enck, Xusheng Xiao, Wei Yang, WHYPER: towards automating risk assessment of mobile applications usenix security symposium. pp. 527- 542 ,(2013)
Baojiang Cui, Haifeng Jin, Giuliana Carullo, Zheli Liu, Service-oriented mobile malware detection system based on mining strategies Pervasive and Mobile Computing. ,vol. 24, pp. 101- 116 ,(2015) , 10.1016/J.PMCJ.2015.06.006
Hyunjae Kang, Jae-wook Jang, Aziz Mohaisen, Huy Kang Kim, None, Detecting and classifying android malware using static analysis along with creator information International Journal of Distributed Sensor Networks. ,vol. 2015, pp. 479174- ,(2015) , 10.1155/2015/479174
Siqi Ma, Shaowei Wang, David Lo, Robert Huijie Deng, Cong Sun, None, Active Semi-supervised Approach for Checking App Behavior against Its Description computer software and applications conference. ,vol. 2, pp. 179- 184 ,(2015) , 10.1109/COMPSAC.2015.93
David M Blei, Andrew Y Ng, Michael I Jordan, None, Latent dirichlet allocation Journal of Machine Learning Research. ,vol. 3, pp. 993- 1022 ,(2003) , 10.5555/944919.944937
Aziz Mohaisen, Omar Alrawi, Manar Mohaisen, None, AMAL: High-fidelity, behavior-based automated malware analysis and classification Computers & Security. ,vol. 52, pp. 251- 266 ,(2015) , 10.1016/J.COSE.2015.04.001
Sancheng Peng, Shui Yu, Aimin Yang, Smartphone Malware and Its Propagation Modeling: A Survey IEEE Communications Surveys and Tutorials. ,vol. 16, pp. 925- 941 ,(2014) , 10.1109/SURV.2013.070813.00214
Ping Wang, Yu-Shih Wang, Malware behavioural detection and vaccine development by using a support vector model classifier Journal of Computer and System Sciences. ,vol. 81, pp. 1012- 1026 ,(2015) , 10.1016/J.JCSS.2014.12.014
Bin Wu, Tianliang Lu, Kangfeng Zheng, Dongmei Zhang, Xing Lin, Smartphone malware detection model based on artificial immune system China Communications. ,vol. 11, pp. 86- 92 ,(2014) , 10.1109/CC.2014.7022530
Zhengyang Qu, Vaibhav Rastogi, Xinyi Zhang, Yan Chen, Tiantian Zhu, Zhong Chen, AutoCog: Measuring the Description-to-permission Fidelity in Android Applications computer and communications security. pp. 1354- 1365 ,(2014) , 10.1145/2660267.2660287