"Less Give More": Evaluate and zoning Android applications

被引:7
|
作者
Ab Razak, Mohd Faizal [1 ,2 ]
Anuar, Nor Badrul [1 ]
Salleh, Rosli [1 ]
Firdaus, Ahmad [2 ]
Faiz, Muhammad [1 ]
Alamri, Hammoudeh S. [2 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Comp Syst & Technol, Kuala Lumpur 50603, Malaysia
[2] Univ Malaysia Pahang, Fac Comp Syst & Software Engn, Lebuhraya Tun Razak, Kuantan 26300, Pahang, Malaysia
关键词
Risk assessment; Analytical hierarchy process (AHP); Mobile device; Android; EZADroid; RISK-ASSESSMENT; MALWARE CHARACTERIZATION; SECURITY; MODEL; CLASSIFICATION; SELECTION; SYSTEM; TRENDS;
D O I
10.1016/j.measurement.2018.10.034
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The Android security mechanism is the first approach to protect data, system resource as well as reduce the impact of malware. Past malware studies tend to investigate the novel approaches of preventing, detecting and responding to malware threats but little attention has been given to the area of risk assessment. This paper aims to fill that gap by presenting a risk assessment approach that evaluate the risk zone for an application. The permission-based approach is presented for evaluating and zoning the Android applications (EZADroid), based on risk assessment. The EZADroid applies the Analytic Hierarchy Process (AHP) as a decision factor to calculate the risk value. A total of 5000 benign and 5000 malware applications were drawn from the AndroZoo and Drebin datasets for evaluation. Results showed that the EZADroid had achieved 89.82% accuracy rate in classifying the application into a different level of risk zones (i.e. very low, low, medium, and high). (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:396 / 411
页数:16
相关论文
共 50 条
  • [1] A Permission verification approach for android mobile applications
    Geneiatakis, Dimitris
    Fovino, Igor Nai
    Kounelis, Ioannis
    Stirparo, Paquale
    COMPUTERS & SECURITY, 2015, 49 : 192 - 205
  • [2] Privacy Risk Assessment for SQLite Based Android Applications
    Yeh, Kuo-Hui
    Hou, Jia-Li
    Chen, Lin-Chih
    Liao, Hao-Xiang
    Yang, Wei-Pang
    JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (07): : 1533 - 1541
  • [3] Leakage Detection and Risk Assessment on Privacy for Android Applications: LRPdroid
    Lo, Nai-Wei
    Yeh, Kuo-Hui
    Fan, Chuan-Yen
    IEEE SYSTEMS JOURNAL, 2016, 10 (04): : 1361 - 1369
  • [4] An Analysis Framework for Information Loss and Privacy Leakage on Android Applications
    Yeh, Kuo-Hui
    Lo, Nai-Wei
    Fan, Chuan-Yen
    2014 IEEE 3RD GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), 2014, : 216 - 218
  • [5] PRADroid: Privacy Risk Assessment for Android Applications
    Yang, Yang
    Du, Xuehui
    Yang, Zhi
    2021 IEEE 5TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP), 2021, : 90 - 95
  • [6] SEMA: An approach based on internal measurement to evaluate energy efficiency of Android applications
    Fischer, Leonardo Matthis
    de Brisolara, Lisane Brisolara
    Balzano de Mattos, Julio Carlos
    2015 BRAZILIAN SYMPOSIUM ON COMPUTING SYSTEMS ENGINEERING (SBESC), 2015, : 48 - 53
  • [7] Behavioral classification of Android applications using system calls
    Razgallah, Asma
    Khoury, Raphael
    2021 28TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2021), 2021, : 43 - 52
  • [8] Android Applications Scanning: The Guide
    Almomani, Iman
    Khayer, Aala
    2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, : 357 - 361
  • [9] Estimate Risks Eate for Android Applications Using Android Permissions
    Er-Rajy, Latifa
    El Kiram, My Ahmed
    El Ghazouani, Mohamed
    INTERNATIONAL JOURNAL OF MOBILE COMPUTING AND MULTIMEDIA COMMUNICATIONS, 2021, 12 (04)
  • [10] Migrating Android Applications to the Cloud
    Hung, Shih-Hao
    Shieh, Jeng-Peng
    Lee, Chen-Pang
    INTERNATIONAL JOURNAL OF GRID AND HIGH PERFORMANCE COMPUTING, 2011, 3 (02) : 14 - 28