Permission Sensitivity-Based Malicious Application Detection for Android
نویسندگان
چکیده
Since a growing number of malicious applications attempt to steal users’ private data by illegally invoking permissions, application stores have carried out many malware detection methods based on permissions. However, most them ignore specific permission combinations and categories that affect the accuracy. The features they extracted are neither representative enough distinguish benign applications. For these problems, an Android method sensitivity is proposed. First, for each kind categories, combination extracted. sensitive feature set corresponding category label then obtained selection sensitivity. In following step, call situation be detected compared with set, weight allocation used quantify this information into numerical features. proposed detection, three machine-learning algorithms selected construct classifier model optimize parameters. Compared traditional methods, consumed 60.94% less time while still achieving high accuracy up 92.17%.
منابع مشابه
Permission-Based Android Malware Detection
Mobile devices have become popular in our lives since they offer almost the same functionality as personal computers. Among them, Android-based mobile devices had appeared lately and, they were now an ideal target for attackers. Android-based smartphone users can get free applications from Android Application Market. But, these applications were not certified by legitimate organizations and the...
متن کاملPermission based Malware Analysis & Detection in Android
Android being a leading and the most popular operating system for smart phones and tablets, has also become a prime target for the attackers due to its growing users and it being an open source platform. This document describes the work done in detecting malware in the Android platform by performing static analysis on the permission based framework in Android platform. In our work, we have extr...
متن کاملMining permission patterns for contrasting clean and malicious android applications
Android application uses permission system to regulate the access to system resources and users’ privacy-relevant information. Existing work have demonstrated several techniques to study the required permissions declared by the developers, but few attention has been paid for used permissions. Besides, no specific permission combination is identified to be effective for malware detection. To fil...
متن کاملContrasting Permission Patterns between Clean and Malicious Android Applications
The Android platform uses a permission system model to allow users and developers to regulate access to private information and system resources required by applications. Permissions have been proved to be useful for inferring behaviors and characteristics of an application. In this paper, a novel method to extract contrasting permission patterns for clean and malicious applications is proposed...
متن کاملAutomatic detection of inter-application permission leaks in Android applications
Due to their growing prevalence, smartphones can access an increasing amount of sensitive user information. To better protect this information, modern mobile operating systems provide permission-based security, which restricts applications to only access a clearly defined subset of system APIs and user data. The Android operating system builds upon already successful permission systems, but com...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2021
ISSN: ['1939-0122', '1939-0114']
DOI: https://doi.org/10.1155/2021/6689486