Android mobile security by detecting and classification of malware based on permissions using machine learning algorithms

作者: P. Ravi Kiran Varma , Kotari Prudvi Raj , K.V. Subba Raju

DOI: 10.1109/I-SMAC.2017.8058358

关键词:

摘要: … permission fields are extracted from the android manifest file of the apps. Second, a data base of all the permissions … The false positives are none and only one false negative is reported…

参考文章(16)
Sara Najari, Malware Detection Using Data Mining Techniques intelligent information systems. ,vol. 3, pp. 33- ,(2014) , 10.11648/J.IJIIS.S.2014030601.16
Imtithal A.Saeed, Ali Selamat, Ali M. A. Abuagoub, A survey on malware propagation, analysis, and detection International Journal of Computer Applications. ,vol. 67, pp. 25- 31 ,(2013) , 10.5120/11480-7108
Zul Hilmi Abdullah, Madihah Mohd Saudi, An Efficient Framework to Build Up Malware Dataset World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering. ,vol. 7, pp. 1104- 1109 ,(2013)
Blake Anderson, Curtis Storlie, Terran Lane, Improving malware classification Proceedings of the 5th ACM workshop on Security and artificial intelligence - AISec '12. pp. 3- 14 ,(2012) , 10.1145/2381896.2381900
Ivan Firdausi, Charles lim, Alva Erwin, Anto Satriyo Nugroho, Analysis of Machine learning Techniques Used in Behavior-Based Malware Detection international conference on advances in computing, control, and telecommunication technologies. pp. 201- 203 ,(2010) , 10.1109/ACT.2010.33
Yajin Zhou, Xuxian Jiang, Dissecting Android Malware: Characterization and Evolution ieee symposium on security and privacy. pp. 95- 109 ,(2012) , 10.1109/SP.2012.16
M.G. Schultz, E. Eskin, F. Zadok, S.J. Stolfo, Data mining methods for detection of new malicious executables ieee symposium on security and privacy. pp. 38- 49 ,(2001) , 10.1109/SECPRI.2001.924286
Khalid Alfalqi, Rubayyi Alghamdi, Mofareh Waqdan, Android Platform Malware Analysis International Journal of Advanced Computer Science and Applications. ,vol. 6, ,(2015) , 10.14569/IJACSA.2015.060120
Zarni Aung, Win Zaw, Permission-Based Android Malware Detection International Journal of Scientific & Technology Research. ,vol. 2, pp. 228- 234 ,(2013)
Yoshiki Asayama, Akihiro Nishie, Kousei Ishigami, Yasuhiro Ushijima, Yukihisa Takayama, Daisuke Okamoto, Nobuhiro Fujita, Koichiro Morita, Hiroshi Honda, Hemodynamic changes under balloon occlusion of hepatic artery: predictor of the short-term therapeutic effect of balloon-occluded transcatheter arterial chemolipiodolization using miriplatin for hepatocellular carcinoma SpringerPlus. ,vol. 5, pp. 1- 8 ,(2016) , 10.1186/S40064-016-1880-7