2019
DOI: 10.3390/app9020277
|View full text |Cite
|
Sign up to set email alerts
|

Research on Data Mining of Permission-Induced Risk for Android IoT Devices

Abstract: With the growing era of the Internet of Things (IoT), more and more devices are connecting with the Internet using android applications to provide various services. The IoT devices are used for sensing, controlling and monitoring of different processes. Most of IoT devices use Android applications for communication and data exchange. Therefore, a secure Android permission privileged mechanism is required to increase the security of apps. According to a recent study, a malicious Android application is developed… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
20
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 31 publications
(21 citation statements)
references
References 52 publications
1
20
0
Order By: Relevance
“…Figure 3 shows the most frequently requested permissions by the samples in our dataset. The pattern of the permission requested by the apps is basically similar to the recent studies [ 29 , 45 ]. Although we can observe from the figure that few of the permissions (e.g., INTERNET and READ_PHONE_STATE) are the most widely requested permissions in the dataset by both benign and malware samples, prior research confirms that benign and malware apps requesting a similar set of permissions is very common.…”
Section: Resultssupporting
confidence: 87%
“…Figure 3 shows the most frequently requested permissions by the samples in our dataset. The pattern of the permission requested by the apps is basically similar to the recent studies [ 29 , 45 ]. Although we can observe from the figure that few of the permissions (e.g., INTERNET and READ_PHONE_STATE) are the most widely requested permissions in the dataset by both benign and malware samples, prior research confirms that benign and malware apps requesting a similar set of permissions is very common.…”
Section: Resultssupporting
confidence: 87%
“…Khan et al [49,50] analysed ResNet and GoogleNet models for malware detection using image processing technique. Kumar et al [51,52] used the Convolutional Neural Network CNN model for malicious code detection based on pattern recognition and permission-induced risk for Android IoT Devices, respectively. Comparison of the different approaches for botnet identification is a difficult task because different evaluations and experiments use different botnet samples and data sets.…”
Section: Comparison With Other Machine Learning Classifiersmentioning
confidence: 99%
“…SiGPID [12], an efficient detection system based on permission usage analysis to cope with the rapid increase in the number of Android malware. Kumar et al [13] proposed a novel method to distinguish between malware and benign applications based on association rule for permission mining. HinDroid [14] propose a novel feature extraction method that uses metapath to characterize the semantic relatedness of apps and API calls, and then combine the SVM algorithm to detect malware.…”
Section: Related Workmentioning
confidence: 99%