"Less Give More": Evaluate and zoning Android applications

被引:7
作者
Ab Razak, Mohd Faizal [1 ,2 ]
Anuar, Nor Badrul [1 ]
Salleh, Rosli [1 ]
Firdaus, Ahmad [2 ]
Faiz, Muhammad [1 ]
Alamri, Hammoudeh S. [2 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Comp Syst & Technol, Kuala Lumpur 50603, Malaysia
[2] Univ Malaysia Pahang, Fac Comp Syst & Software Engn, Lebuhraya Tun Razak, Kuantan 26300, Pahang, Malaysia
关键词
Risk assessment; Analytical hierarchy process (AHP); Mobile device; Android; EZADroid; RISK-ASSESSMENT; MALWARE CHARACTERIZATION; SECURITY; MODEL; CLASSIFICATION; SELECTION; SYSTEM; TRENDS;
D O I
10.1016/j.measurement.2018.10.034
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The Android security mechanism is the first approach to protect data, system resource as well as reduce the impact of malware. Past malware studies tend to investigate the novel approaches of preventing, detecting and responding to malware threats but little attention has been given to the area of risk assessment. This paper aims to fill that gap by presenting a risk assessment approach that evaluate the risk zone for an application. The permission-based approach is presented for evaluating and zoning the Android applications (EZADroid), based on risk assessment. The EZADroid applies the Analytic Hierarchy Process (AHP) as a decision factor to calculate the risk value. A total of 5000 benign and 5000 malware applications were drawn from the AndroZoo and Drebin datasets for evaluation. Results showed that the EZADroid had achieved 89.82% accuracy rate in classifying the application into a different level of risk zones (i.e. very low, low, medium, and high). (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:396 / 411
页数:16
相关论文
共 80 条
[51]   Assessing Privacy Risks in Android: A User-Centric Approach [J].
Mylonas, Alexios ;
Theoharidou, Marianthi ;
Gritzalis, Dimitris .
RISK ASSESSMENT AND RISK-DRIVEN TESTING, RISK 2013, 2014, 8418 :21-37
[52]   Fog over Virtualized IoT: New Opportunity for Context-Aware Networked Applications and a Case Study [J].
Naranjo, Paola G. V. ;
Pooranian, Zahra ;
Shamshirband, Shahaboddin ;
Abawajy, Jemal H. ;
Conti, Mauro .
APPLIED SCIENCES-BASEL, 2017, 7 (12)
[53]   Evaluation of machine learning classifiers for mobile malware detection [J].
Narudin, Fairuz Amalina ;
Feizollah, Ali ;
Anuar, Nor Badrul ;
Gani, Abdullah .
SOFT COMPUTING, 2016, 20 (01) :343-357
[54]  
Nikou S., 2011, 2011 Tenth International Conference on Mobile Business, ICMB, P119, DOI 10.1109/ICMB.2011.29
[55]   Evaluation of mobile services and substantial adoption factors with Analytic Hierarchy Process (AHP) [J].
Nikou, Shahrokh ;
Mezei, Jozsef .
TELECOMMUNICATIONS POLICY, 2013, 37 (10) :915-929
[56]  
Nokia, 2016, NOKIA NEWS
[57]  
Opydo D., 2013, 6 REASONS USE ANAL H, P1
[58]  
Orthacker C., 2012, Security and Privacy in Mobile Information and Communication Systems, P40
[59]  
Pandita R., 2013, P 22 USENIX C SECURI, P527
[60]  
Peng H., 2012, P 2012 ACM C COMPUTE, P241