Android Malicious Apps Detection and Notification to Prevent Malware Using New Framework

Authors

  • Rohit Sarjerao Raut  ME Student, Dept. of CSE, Ashokrao Mane Group of Institution vathar tarf vadgaon, Kolhapur, India
  • Nishita Nitesh Patil  Assistant Professor, Dept. of CSE, Ashokrao Mane Group of Institution vathar tarf vadgaon, Kolhapur, India

Keywords:

SVM, Malicious, feature extraction, Fest.

Abstract

The attractiveness and openness of android makes markets targets for malware attacks and causes number of malware instances original hidden behind the large number of applications that seriously harmful to user privacy and security. Due to the popularity of android operating system and use of internet, android application developers are attracted towards cyber crime. For example, any person sends message to another person using internet to install particular application and that could be malicious. Malware is employed intentionally to cause harm to system by gaining confidential information from the device and modifying file contents. To prevent user privacy and provide security to user data by notifying them about malicious applications SVM with a linear classifier is used to differentiate between benign and malicious applications. For feature extraction and selection Fest tool will be used.

References

  1. Andrea Saracino, Daniele Sgandurra, Gianluca Dini and Fabio Martinelli, "MADAM: Effective and Efficient Behaviour-based Android Malware Detection and Prevention", IEEE Transaction 2016.
  2. Y. Aafer, W. Du, and H. Yin, "Droidapiminer: Mining apilevel features for robust malware detection in android," inSecurity and Privacy in Communication Networks, Social Informaticsand Telecommunications Engineering, T. Zia, A. Zomaya,V. Varadharajan, and M. Mao, Eds. Springer International publishing, 2013, vol. 127, pp. 86–103. Online]. Available :http://dx.doi.org/10.1007/978-3-319-04283-1 6
  3. A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. agner,"Android permissions: user attention, comprehension, andbehavior," in Symposium On Usable Privacy and Security, SOUPS’12, Washington, DC, USA – july 11 - 13, 2012, 2012.
  4. O. Kramer, "Dimensionality reduction by unsupervised k-nearestneighbor regression," in Machine Learning and Applications and Workshops (ICMLA), 2011 10th International Conference on, vol. 1,Dec 2011, pp. 275–278.
  5. "Global mobile statistics 2014 part a: Mobile subscribers;handset market share; mobile operators," http://mobiforge.com/researchanalysis/ global- obile-statistics-2014-part-a-mobilesubscribers-handset-arket-share- mobile-operators, 2014.
  6. A.Developer,"Android-sm smanager reference page," 2015.Online]. Available: http://developer. Android .com/reference/ android/telephony/ SmsManager.html
  7. A. Reina, A. Fattori, and L. Cavallaro, "A system call-centric analysis and stimulation technique to automatically reconstructandroid malware behaviors," EuroSec, April, 2013.
  8. "How antivirus affect battery life," https://www. luculentsystems.com /techblog/minimize-battery-drain-by-antivirus-software/,last accessed on 23/02/2015.
  9. Y. Zhou, X. Zhang, X. Jiang, and V. W. Freeh, "Taminginformation- stealing smartphone applications (on android)," inProceedings of the 4th International Conference on Trust andTrustworthy Computing, ser.
  10. TRUST’11. Berlin, Heidelberg:Springer-Verlag, 2011, pp. 93– 107.online]. Available: http://dl.acm.org/ citation.cfm ?id=20222 45.2022255.
  11. Y. Zhauniarovich, G. Russello, M. Conti, B. Crispo, and E. enandes, "Moses: Supporting and enforcing security profiles onsmartphones," Dependable and Secure Computing, IEEE Transactionson, vol. 11, no. 3, pp. 211–223, May 2014.
  12. Y. Zhou and X. Jiang, "Dissecting android malware:Characterization and evolution," in Proceedings of the 2012IEEE Symposium on Security and Privacy, ser. SP ’12. Washington,DC, USA: IEEE Computer Society, 2012, pp. 95–109. Online].Available: http://dx .doi.org /10. 1109/SP.2012.16.
  13. Kai Zhao, Dafang Zhang; Xin Su; Wenjia Li "Fest: A feature extraction and selection tool for Android malware detection", IEEE Symposium on Computers and Communication (ISCC), 2015.

Downloads

Published

2017-06-30

Issue

Section

Research Articles

How to Cite

[1]
Rohit Sarjerao Raut, Nishita Nitesh Patil, " Android Malicious Apps Detection and Notification to Prevent Malware Using New Framework, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 3, pp.480-483, May-June-2017.