Survey on Mobile Malware Analysis and Detection

  • Authors

    • K Swetha
    • K V.D.Kiran
    2018-05-31
    https://doi.org/10.14419/ijet.v7i2.32.15584
  • Malware Analysis, Malware Detection.
  • The amazing advances of mobile phones enable their wide utilize. Since mobiles are joined with pariah applications, bundles of security and insurance issues are incited. But, current mobile malware analysis and detection advances are as yet flawed, incapable, and incomprehensive. On account of particular qualities of mobiles such as constrained assets, user action and neighborhood correspondence ability, consistent system network, versatile malware detection faces new difficulties, particularly on remarkable runtime malware area. This paper provides overview on  malware classification, methodologies of assessment, analysis and on and off device detection methods on android. The work mainly focuses on different classification algorithms which are used as a part of dynamic malware detection on android.

     

     

  • References

    1. [1] Ping Yan and Zheng Yan. A Survey on dynamic mobile malware detection. Software Qual J. Springer.2017;DOI 10.1007/s11219-017-9368-4.

      [2] Jemal Abawajy, Andrei Kelarev. Iterative Classifier Fusion System for the Detection of Android malware. IEEE Transactions on Big Data. Vol.5 No.3, November 2017.

      [3] M. Asha Jerlin and C.Jaya kumar. A Dynamic Malware Analysis for Windows Platform – A Survey. Indian Journal of Science and Technology.2015;8(26).

      [4] Ekta Gandotra, Divya Bansal ,Sanjeev Sofat . Malware Analysis and Clas­sification: A Survey. Journal of Information Security. 2014; 5(2):56–64.

      [5] Parvez Faruki, Ammar Bharmal, Vijay Laxmi, Vijay Ganmoor, Manoj Singh Gour, Mauro Conti, Senior member of IEEE and Muttukrishnan Rajarajan. Android Security: A survey of issues, malware penetration, and defenses. IEEE Communications Surveys & Tutorials.2015;VOL . 17, NO. 2.

      [6] William Enck, Machigar Ongtang and Patrick McDaniel. On Lightweight Mobile Phone Application Certification. Nov 2009. ACM 978-1-60558-352-5.

      [7] Michael Grace, Yajin Zhou, Qiang Zhang, Shihong Zou and Xuxian Jiang. RiskRanker: Scalable and accurate zero-day Android malware detection. June 2012. ACM 978-1-4503-1301-8.

      [8] Yajin Zhou, Zhi Wang, Wu Zhou and Xuxian Jiang. Hey, You, Get of My Market: Detecting malicious apps in Official and third party android markets. Annu, NDSS, New York, NY, USA, 2012.

      [9] Jinyung Kim, Yongho Yoon, Kwangkeun Yi and Junbum Shin. SCANDAL: Static Analyzer for Detecting Privacy Leaks in Android Applications. 2012 .IEEE Symposium on Security and Privacy.

      [10] Lok Kwong Yan and Heng Yin. Droidscope: Seamlessly reconstructing the OS and Dalvik semantic views for dynamic Android malware analysis. 21st USENIX Security Symp., 2012.

      [11] Yu Feng, Saswat Anand, Isil Dillig and Alex Aiken. Apposcopy: Semantics-Based detection of android malware through static analysis. SIGSOFTFSE, 2014.

      [12] Erika Chin, Adrienne Porter Felt, Kate Greenwood and David Wagner. Analyzing inter-application communication in android. 9th Int. Conf. MobiSys, New York, NY, USA 2011.

      [13] B.P.Sarma .Android permissions: A perspective combining risks and benefits. 17th ACM symp Access Control Models Technol, 2012.

      [14] David Barrera, H Gunes Kayacik, P C van Oorschot and Anil Somayaji. A methodology for empirical analysis of permission-based security models and its application to android. 17th ACM Conf. CCS, 2010.

      [15] I Wayan oka krismawan putra, Yudha purwanto, Fiky Yosef suratman. Modified K-means algorithm using timestamp initialization in sliding window to detect anomaly traffic. ICCEREC, IEEE 2015.

      [16] DAOJING HE, SAMMY CHAN, AND MOHSEN GUIZANI. Mobile Application Security: Malware Threats and Defenses. 1536-1284/15/$25.00 IEEE Wireless Communications, February 2015.

      [17] K.V.D.KIRAN,†MULTI CROSS PROTOCOL WITH HYBRID TOPOGRAPHY CONTROL FOR MANETSâ€, Journal of Theoretical and Applied Information Technology, 2017. Vol.95. No.3, ISSN: 1992-8645

      [18] K.V.D.KIRAN,â€Integrated Distributed Architecture to Integrate Wireless Sensor Networks (WSN) with Grid for Healthcare,†International Journal of Bio-Science and Bio-Technologyâ€, Vol.7, No.3 (2015), pp.243-250, ISSN: 2233-7849 IJBSBT.

      [19] K.V.D.KIRAN,â€A Critical study of information security risk assessment using fuzzy and entropy methodologies,†International Journal on Computers and Communicationsâ€, Pages: 17-22,Vol1,Isuue1,Dec-,12, ISSN: 2319 – 8869.

      [20] K.V.D.KIRAN,â€Literature Review on Risk and their Components†International Journal for Research in Emerging Science and Technology (IJREST) “,Volume-1, Issue-6, November 2014â€, (e-ISSN 2349-7610).

      [21] K.V.D.KIRAN,â€Performance Analysis of Layered Architecture to Integrate Mobile Devices and Grid computing with a resource scheduling algorithmâ€, IEEE CS’07, SIVAKASI, TAMIL NADU,India

      [22] K.V.D.Kiran “Risk Assessment in Distributed Banking System,†International Journal of Applied Engineering Research(IJAER)â€, ISSN 0973-4562 Volume 9, Number 19 (2014) pp. 6087-6100

      [23] K.V.D.Kiran ,â€Analysis and Classification Scheme of Risk Assessment Miniatures placed on Different Criteria for Reducing the Riskâ€, International Journal of Applied Engineering Researchâ€pp.12069-12085, ISSN 0973-4562 Volume 9, Number 22 (2014).

      [24] K.V.D.Kiran ,â€Information Security risk authority in critical informative systemsâ€,CSIBIG 2014.

  • Downloads

  • How to Cite

    Swetha, K., & V.D.Kiran, K. (2018). Survey on Mobile Malware Analysis and Detection. International Journal of Engineering & Technology, 7(2.32), 279-282. https://doi.org/10.14419/ijet.v7i2.32.15584