"Less Give More": Evaluate and zoning Android applications

被引:7
|
作者
Ab Razak, Mohd Faizal [1 ,2 ]
Anuar, Nor Badrul [1 ]
Salleh, Rosli [1 ]
Firdaus, Ahmad [2 ]
Faiz, Muhammad [1 ]
Alamri, Hammoudeh S. [2 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Comp Syst & Technol, Kuala Lumpur 50603, Malaysia
[2] Univ Malaysia Pahang, Fac Comp Syst & Software Engn, Lebuhraya Tun Razak, Kuantan 26300, Pahang, Malaysia
关键词
Risk assessment; Analytical hierarchy process (AHP); Mobile device; Android; EZADroid; RISK-ASSESSMENT; MALWARE CHARACTERIZATION; SECURITY; MODEL; CLASSIFICATION; SELECTION; SYSTEM; TRENDS;
D O I
10.1016/j.measurement.2018.10.034
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The Android security mechanism is the first approach to protect data, system resource as well as reduce the impact of malware. Past malware studies tend to investigate the novel approaches of preventing, detecting and responding to malware threats but little attention has been given to the area of risk assessment. This paper aims to fill that gap by presenting a risk assessment approach that evaluate the risk zone for an application. The permission-based approach is presented for evaluating and zoning the Android applications (EZADroid), based on risk assessment. The EZADroid applies the Analytic Hierarchy Process (AHP) as a decision factor to calculate the risk value. A total of 5000 benign and 5000 malware applications were drawn from the AndroZoo and Drebin datasets for evaluation. Results showed that the EZADroid had achieved 89.82% accuracy rate in classifying the application into a different level of risk zones (i.e. very low, low, medium, and high). (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:396 / 411
页数:16
相关论文
共 50 条
  • [21] Does More Storage Give California More Water?
    Nover, D. M.
    Dogan, M. S.
    Ragatz, R.
    Booth, L.
    Medellin-Azuara, J.
    Lund, J. R.
    Viers, J. H.
    JOURNAL OF THE AMERICAN WATER RESOURCES ASSOCIATION, 2019, 55 (03): : 759 - 771
  • [22] Repackaging Android Applications for Auditing Access to Private Data
    Berthome, P.
    Fecherolle, T.
    Guilloteau, N.
    Lalande, J. -F.
    2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 388 - 396
  • [23] Quantitative Security Risk Assessment of Android Permissions and Applications
    Wang, Yang
    Zheng, Jun
    Sun, Chen
    Mukkamala, Srinivas
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVII, 2013, 7964 : 226 - 241
  • [24] Privacy Vulnerability Analysis for Android Applications A Practical Approach
    Argudo, Alejandro
    Lopez, Gabriel
    Sanchez, Franklin
    2017 FOURTH INTERNATIONAL CONFERENCE ON EDEMOCRACY & EGOVERNMENT (ICEDEG), 2017, : 256 - 260
  • [25] Assessment of Source Data Vulnerability to Reproduction in Android Applications
    Shafi, Muhammad
    Israr, Muhammad
    Khan, Muhammad Sohail
    Khattak, Muhammad Irfan
    Syed, Togeer Ali
    2017 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2017, : 122 - 126
  • [26] A Novel Approach to Restrict the Access of Malicious Applications in Android
    Dar, Muneer Ahmad
    2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2017,
  • [27] OAUTHLINT: An Empirical Study on OAuth Bugs in Android Applications
    Al Rahat, Tamjid
    Feng, Yu
    Tian, Yuan
    34TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2019), 2019, : 293 - 304
  • [28] Instrumenting Android and Java']Java Applications as Easy as abc
    Arzt, Steven
    Rasthofer, Siegfried
    Bodden, Eric
    RUNTIME VERIFICATION, RV 2013, 2013, 8174 : 364 - 381
  • [29] Certificate Reuse in Android Applications
    Nezhadian, Fatemeh
    Branca, Enrico
    Stakhanova, Natalia
    INFORMATION SECURITY, ISC 2023, 2023, 14411 : 226 - 245
  • [30] A New Protection for Android Applications
    Er-Rajy, Latifa
    El Kiram, My Ahmed
    INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2016, 3 (07): : 15 - 19