2018
DOI: 10.14419/ijet.v7i4.15.21429
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Botnet Classification by using Hybrid Analysis

Abstract: The popularity and adoption of Android smartphones has attracted malware authors to spread the malware to smartphone users. The malware on smartphone comes in various forms such as Trojans, viruses, worms and mobile botnet. However, mobile botnet or Android botnet are more dangerous since they pose serious threats by stealing user credential information, distributing spam and sending distributed denial of service (DDoS) attacks. Mobile botnet is defined as a collection of compromised mobile smartphones and con… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
2
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…Using both permission and API call features, Random Forest obtained the best results with 99.4% TP rate, 16.1% FP rate, 93.2% precision and 99.4% recall. This work was extended in [36] to include system calls and this resulted in improved performance with Random Forest achieving 99.4% TP rate, 12.5% FP rate, 98.2% precision, 99.4% recall and 97.9% accuracy.…”
Section: Botnet Detection On Androidmentioning
confidence: 99%
“…Using both permission and API call features, Random Forest obtained the best results with 99.4% TP rate, 16.1% FP rate, 93.2% precision and 99.4% recall. This work was extended in [36] to include system calls and this resulted in improved performance with Random Forest achieving 99.4% TP rate, 12.5% FP rate, 98.2% precision, 99.4% recall and 97.9% accuracy.…”
Section: Botnet Detection On Androidmentioning
confidence: 99%
“…Random Forest obtained the best results. The work was extended in [13] by including system calls in the feature set. The best results obtained were 99.4% TPR, 12.5% FPR, and 97.9% overall accuracy.…”
Section: Related Workmentioning
confidence: 99%
“…understanding permission protection levels). Moreover, our proposed system requires less feature extraction effort compared to the more manual systems presented in [12], [13], [17], [18], [19] and [26] for example. In section III, we describe the proposed system in greater detail.…”
Section: Related Workmentioning
confidence: 99%
“…Features from permission and API calls which having related with GPS exploitation and the impact to the privacy, financial and system categories were selected during the analysis. Yusof et al listed out the top 20 permission and API calls features that were related with Android botnet and GPS exploitation Yusof, Saudi, et al, 2017b). As a result, from the comprehensive review and analysis, this research selected 12 features for permissions and 30 features for API calls.…”
Section: Datasetmentioning
confidence: 99%
“…Normally, these third-party or unofficial markets provide free, non-paying apps or cheaper apps as compared to Google Play Store. This attracts more users to use the third-party market and thus, it can possibly expose the smartphone users to download and install malicious apps from this market (Yusof, Saudi, & Ridzuan, 2017b). The risk assessment method is needed before the installation for the existing apps or while downloading the apps from third-party markets, to evaluate the reliability of the apps.…”
Section: Introductionmentioning
confidence: 99%