Paper Title : SIGNIFICANT PERMISSION IDENTICATION FOR ANDRIOD MALWARE DETECTION
ISSN : 2394-2231
Year of Publication : 2022
10.5281/zenodo.6409997
MLA Style: SIGNIFICANT PERMISSION IDENTICATION FOR ANDRIOD MALWARE DETECTION " Mr.S.Sambasivam,M.C.A..,M.Phil.., V.Santhosh Kumar " Volume 9 - Issue 2 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
APA Style: SIGNIFICANT PERMISSION IDENTICATION FOR ANDRIOD MALWARE DETECTION " Mr.S.Sambasivam,M.C.A..,M.Phil.., V.Santhosh Kumar " Volume 9 - Issue 2 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
Abstract
The global pervasiveness of smartphones has prompted the development of millions of free and commercially available applications. These applications allow users to perform various activities, such as communicating, gaming, and completing financial and educational tasks. These commonly used devices often store sensitive private information and, consequently, have been increasingly targeted by harmful malicious software. The alarming growth rate of malicious apps has become a serious issue that sets back the prosperous mobile ecosystem. A recent report indicates that a new malicious app for Android is introduced every 10 s. Android allows users to install applications from unverified sources such as third-party app stores and file-sharing websites. The malware infection issue has been so serious that a recent report indicates that 97% of all mobile malware target Android devices to combat this serious malware campaign, we need a scalable malware detection approach that can effectively and efficiently identify malware apps. Numerous malware detection tools have been developed, including system-level and network level approaches. However, scaling the detection for a large bundle of apps remains a challenging task. This project introduces Significant Permission IDentification (SigPID), a malware detection system based on permission usage analysis to cope with the rapid increase in the number of Android malware. Instead of extracting and analyzing all Android permissions, this project develop three levels of pruning by mining the permission data to identify the most significant permissions that can be effective in distinguishing between benign and malicious apps. SigPID then utilizes machine-learningbased classification methods to classify different families of malware and benign apps. This project identifies dangerous permission list, benign permission list and reduce nonsensitive permissions and apply SVM classification on the new data set. The project is designed using R Studio. The coding language used is R.
Reference
[1] M.Grace, Y.Zhou, Q.Zhang, S.Zou and X.Jiang, “RiskRanker: Scalable andaccuratezero-day android malware detection,”inProc.10thInt.Conf. Mobile Syst., Appl., Services, 2012, pp. 281–294. [2] A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, “Android permissions demystified,” in Proc. 18th ACM Conf. Comput. Commun. Security, 2011, pp. 627–638. [3] W. Enck et al., “TaintDroid: An information-flow tracking system for realtimeprivacymonitoringonsmartphones,”ACMTrans.Com put.Syst., vol. 32, no. 2, 2014, Art. no. 5. [4] D. Arp, M. Spreitzenbarth, M. H¨ubner, H. Gascon, K. Rieck, and C. Siemens, “DREBIN: Effective and explainable detection of android malware in your pocket,” presented at Annu. Symp. Netw. Distrib. Syst. Security, 2014. [5] C. Yang, Z. Xu, G. Gu, V. Yegneswaran, and P. Porras, “DroidMiner: Automated mining and characterization of fine-grained malicious behaviors inandroidapplications,”inProc.Eur.Symp.Res.Comput.Securi ty,2014, pp. 163–182. [6] Gartner Says Sales of Mobile Devices Grew 5.6 Percent in Third Quarter of 2011; Smartphone Sales Increased 42 Percent. http://www.gartner.com/it/ page.jsp?id=1848514. [7] Android Market. http://www.android.com/market/. [8] Amazon Appstore for Android. http://www.amazon. com/mobile-apps/b?ie=UTF8&node=2350149011. [9] APPLE,I NC. Apples App Store Downloads Top Three Billion. http://www.apple.com/pr/library/2010/ 01/05appstore.html,January2010. [10] DAVIES, C. iPhone spyware debated as app library “phones home”. http://www.slashgear. com/iphonespyware-debated-as-applibrary-phones-home1752491/,August17,2009. [11] W. Enck, P. Gilbert, B. gon Chun, L. P. Cox, J. Jung, P. McDaniel, and A. Sheth. Taintdroid: An informationflow tracking system for realtime privacy monitoringonsmartphones. InProc.ofUSENIXSymposium on Operating Systems Design and Implementation (OSDI), pages 393–407, 2010 [12] Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets. In Proc. of Network and Distributed System Security Symposium (NDSS), 2012. [13] L.-K.YanandH.Yin. Droidscope: Seamlesslyreconstructing os and dalvik semantic views for dynamic android malware analysis. In Proc. of USENIX Security Symposium, 2012. [14] W. Enck, M. Ongtang, and P. D. McDaniel. On lightweight mobile phone application certification. In Proc. of ACM Conference on Computer and Communications Security (CCS), pages 235–245, 2009. [15] A.P.Felt,E.Chin,S.Hanna,D.Song,andD.Wagner. Android permissions demystified. In Proc. of ACM Conference on Computer and Communications Security (CCS), pages 627–638, 2011
Keywords
— SIGNIFICANT PERMISSION IDENTICATION FOR ANDRIOD MALWARE DETECTION