"Less Give More": Evaluate and zoning Android applications

被引:7
作者
Ab Razak, Mohd Faizal [1 ,2 ]
Anuar, Nor Badrul [1 ]
Salleh, Rosli [1 ]
Firdaus, Ahmad [2 ]
Faiz, Muhammad [1 ]
Alamri, Hammoudeh S. [2 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Comp Syst & Technol, Kuala Lumpur 50603, Malaysia
[2] Univ Malaysia Pahang, Fac Comp Syst & Software Engn, Lebuhraya Tun Razak, Kuantan 26300, Pahang, Malaysia
关键词
Risk assessment; Analytical hierarchy process (AHP); Mobile device; Android; EZADroid; RISK-ASSESSMENT; MALWARE CHARACTERIZATION; SECURITY; MODEL; CLASSIFICATION; SELECTION; SYSTEM; TRENDS;
D O I
10.1016/j.measurement.2018.10.034
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The Android security mechanism is the first approach to protect data, system resource as well as reduce the impact of malware. Past malware studies tend to investigate the novel approaches of preventing, detecting and responding to malware threats but little attention has been given to the area of risk assessment. This paper aims to fill that gap by presenting a risk assessment approach that evaluate the risk zone for an application. The permission-based approach is presented for evaluating and zoning the Android applications (EZADroid), based on risk assessment. The EZADroid applies the Analytic Hierarchy Process (AHP) as a decision factor to calculate the risk value. A total of 5000 benign and 5000 malware applications were drawn from the AndroZoo and Drebin datasets for evaluation. Results showed that the EZADroid had achieved 89.82% accuracy rate in classifying the application into a different level of risk zones (i.e. very low, low, medium, and high). (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:396 / 411
页数:16
相关论文
共 80 条
[41]   Ranking the indicators of building performance and the users' risk via Analytical Hierarchy Process (AHP): Case of Malaysia [J].
Khalil, Natasha ;
Kamaruzzaman, Syahrul Nizam ;
Baharum, Mohamad Rizal .
ECOLOGICAL INDICATORS, 2016, 71 :567-576
[42]   A comparative study and workload distribution model for re-encryption schemes in a mobile cloud computing environment [J].
Khan, Abdul Nasir ;
Ali, Mazhar ;
Khan, Atta Ur Rehman ;
Khan, Fiaz Gul ;
Khan, Iftikhar Ahmed ;
Jadoon, Waqas ;
Shamshirband, Shahab ;
Chronopoulos, Anthony T. .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (16)
[43]   Load balancing in grid computing: Taxonomy, trends and opportunities [J].
Khan, Sumair ;
Nazir, Babar ;
Khan, Iftikhar Ahmed ;
Shamshirband, Shahaboddin ;
Chronopoulos, Anthony T. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :99-111
[44]  
Kim H, 2017, MANAGE IND ENG, P1, DOI 10.1007/978-3-319-48875-2_1
[45]  
Kumar V., 2014, Smart Computing Review, V4, P211, DOI [DOI 10.6029/SMARTCR.2014.03.007, 10.6029/smartcr.2014.03.007.8]
[46]  
Ledermuller Thomas, 2011, Trust, Privacy and Security in Digital Business. Proceedings 8th International Conference (TrustBus 2011), P210, DOI 10.1007/978-3-642-22890-2_18
[47]  
Lee S., 2015, The current state of gender-sensitive curricula in college-level STEM education in Korea and a complementary course proposal, P1, DOI DOI 10.1016/J.COSE.2015.02.003
[48]   A hybrid information security risk assessment procedure considering interdependences between controls [J].
Lo, Chi-Chun ;
Chen, Wan-Jia .
EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (01) :247-257
[49]  
Lo Nigel, 2014, Policy Brief UCLA Cent Health Policy Res, P1
[50]   Ensemble machine-learning-based geospatial approach for flood risk assessment using multi-sensor remote-sensing data and GIS [J].
Mojaddadi, Hossein ;
Pradhan, Biswajeet ;
Nampak, Haleh ;
Ahmad, Noordin ;
bin Ghazali, Abdul Halim .
GEOMATICS NATURAL HAZARDS & RISK, 2017, 8 (02) :1080-1102