2018
DOI: 10.3390/app8091622
|View full text |Cite
|
Sign up to set email alerts
|

Web-Based Android Malicious Software Detection and Classification System

Abstract: Android is the most used operating system (OS) by mobile devices. Since applications uploaded to Google Play and other stores are not analyzed comprehensively, it is not known whether the applications are malicious software or not. Therefore, there is an urgent need to analyze these applications regarding malicious software. Moreover, mobile devices have limited resources to analyze the applications. In this study, a malicious detection system named “Web-Based Android Malicious Software Detection and Classific… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(11 citation statements)
references
References 29 publications
0
11
0
Order By: Relevance
“…Mostly, these methods are non-signature-based and are capable of handling some of the common bottlenecks of traditional signature-based detection methods, such as the detection of "unknown" and "zero-day" malware. Based on the feature extraction method, ML-based techniques are grouped as static, dynamic and hybrid [12]. In the static method, the Android app is not executed, while the dynamic method executes samples in a controlled environment.…”
Section: Machine-learning-based Android Malware Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Mostly, these methods are non-signature-based and are capable of handling some of the common bottlenecks of traditional signature-based detection methods, such as the detection of "unknown" and "zero-day" malware. Based on the feature extraction method, ML-based techniques are grouped as static, dynamic and hybrid [12]. In the static method, the Android app is not executed, while the dynamic method executes samples in a controlled environment.…”
Section: Machine-learning-based Android Malware Detectionmentioning
confidence: 99%
“…The following research works have been done in the direction of providing online services and platforms to perform analysis and classification of Android malware, quite similar to what we proposed in this article. In [12], the author developed a web-based Android malware detection and classification application following client-server architecture which helps users to submit and analyze apps based on static analysis. In Table 1, a summary of the key features of various similar platforms is presented.…”
Section: Introductionmentioning
confidence: 99%
“…Their system detects malware by observing the network patterns of applications and the same research claims that there is pattern similarity of network traffic patterns of different applications with the same functions. A web-based android malware detection and classification system has been proposed [41] where they developed an auto-trigger view identification in addition to a droidbox structure. Android malicious software detection is outside the scope of this paper.…”
Section: Dynamic Analysis Processmentioning
confidence: 99%
“…Thus, it is substantially important to consider the data aggregations caused re-identification at the ultimate app owners' end ( Figure 1). Therefore, a concrete classification of PII on the above issue is highly needed to reduce the risk of specific PII leakage [23]. Existing privacy risk-models do not consider this data aggregation fact [20,[39][40][41].…”
Section: Problem Statement and Motivationmentioning
confidence: 99%
“…However, identity profiling by app producing companies via 'app permissions' is nothing new [7,9,17,18], rather personal data collected via app permissions' permissions' are frequently breaching user's PII [14,19]. As today's mobile device are facilitated with advanced sensors, apps are allowed to collect diverse personal data [20][21][22][23].…”
Section: Introductionmentioning
confidence: 99%