Static Anomaly Detection Framework for Android-based Mobile Phones

被引:0
作者
Ji, Xiaobo [1 ]
Zeng, Fan [1 ]
Ye, Bangxian [2 ]
机构
[1] Third Mil Med Univ, Duping Hosp, Research Inst Field Surg, Dept Informat, Chongqing, Peoples R China
[2] Fujian Normal Univ, Fac Software, Fuzhou 350007, Peoples R China
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2016年 / 10卷 / 12期
关键词
Android-based mobile devices; Support vector machine; Cloud computing; Static anomaly detection;
D O I
10.14257/ijsia.2016.10.12.20
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of wireless communication, mobile network, and embedded system technologies, android-based mobile devices show a number of useful functions and then they are attacked by hackers for obtaining some useful information. In this paper, an efficient static anomaly detection framework is shown for android-based mobile phones to improve their security. The proposed framework uses support vector machine to perform the anomaly detection and exploits the cloud computing platform to reduce the impact on android-based mobile phones. Experimental results show that the proposed framework is better than existing anomaly detection frameworks in terms of the detection precision and the detection time.
引用
收藏
页码:251 / 259
页数:9
相关论文
共 16 条
  • [1] Enhancing malware detection for Android systems using a system call filtering and abstraction process
    Amamra, Abdelfattah
    Robert, Jean-Marc
    Talhi, Chamseddine
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (07) : 1179 - 1192
  • [2] Android: Changing the Mobile Landscape
    Butler, Margaret
    [J]. IEEE PERVASIVE COMPUTING, 2011, 10 (01) : 4 - 7
  • [3] Cai J., 2016, INT J NETWORK SECURI, V18, P182, DOI [10.6633/IJNS.201601.18(1).20, DOI 10.6633/IJNS.201601.18(1).20]
  • [4] Cuimei Li, 2014, Applied Mechanics and Materials, V672-674, P1981, DOI 10.4028/www.scientific.net/AMM.672-674.1981
  • [5] Android Security: A Survey of Issues, Malware Penetration, and Defenses
    Faruki, Parvez
    Bharmal, Ammar
    Laxmi, Vijay
    Ganmoor, Vijay
    Gaur, Manoj Singh
    Conti, Mauro
    Rajarajan, Muttukrishnan
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (02): : 998 - 1022
  • [6] Android Mobile Application System Call Event Pattern Analysis for Determination of Malicious Attack
    Ham, You Joung
    Moon, Daeyeol
    Lee, Hyung-Woo
    Lim, Jae Deok
    Kim, Jeong Nyeo
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 231 - 246
  • [7] Identifying malicious Android apps using permissions and system events
    Han, Hongmu
    Li, Ruixuan
    Gu, Xiwu
    [J]. INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2016, 8 (01) : 46 - 58
  • [8] Hu W., 2014, INT J HYBRID INFORM, V7, P393
  • [9] Hu W., 2014, INT J MULTIMEDIA UBI, V9, P273
  • [10] Kang H., 2015, INT J DISTRIBUTED SE, V2015