"Less Give More": Evaluate and zoning Android applications

被引:7
|
作者
Ab Razak, Mohd Faizal [1 ,2 ]
Anuar, Nor Badrul [1 ]
Salleh, Rosli [1 ]
Firdaus, Ahmad [2 ]
Faiz, Muhammad [1 ]
Alamri, Hammoudeh S. [2 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Comp Syst & Technol, Kuala Lumpur 50603, Malaysia
[2] Univ Malaysia Pahang, Fac Comp Syst & Software Engn, Lebuhraya Tun Razak, Kuantan 26300, Pahang, Malaysia
关键词
Risk assessment; Analytical hierarchy process (AHP); Mobile device; Android; EZADroid; RISK-ASSESSMENT; MALWARE CHARACTERIZATION; SECURITY; MODEL; CLASSIFICATION; SELECTION; SYSTEM; TRENDS;
D O I
10.1016/j.measurement.2018.10.034
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The Android security mechanism is the first approach to protect data, system resource as well as reduce the impact of malware. Past malware studies tend to investigate the novel approaches of preventing, detecting and responding to malware threats but little attention has been given to the area of risk assessment. This paper aims to fill that gap by presenting a risk assessment approach that evaluate the risk zone for an application. The permission-based approach is presented for evaluating and zoning the Android applications (EZADroid), based on risk assessment. The EZADroid applies the Analytic Hierarchy Process (AHP) as a decision factor to calculate the risk value. A total of 5000 benign and 5000 malware applications were drawn from the AndroZoo and Drebin datasets for evaluation. Results showed that the EZADroid had achieved 89.82% accuracy rate in classifying the application into a different level of risk zones (i.e. very low, low, medium, and high). (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:396 / 411
页数:16
相关论文
共 50 条
  • [31] Taming Exceptions in Android Applications
    Oliveira, Juliana
    2018 29TH IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW), 2018, : 174 - 177
  • [32] On the Automatic Categorisation of Android Applications
    Sanz, Borja
    Santos, Igor
    Laorden, Carlos
    Ugarte-Pedrero, Xabier
    Garcia Bringas, Pablo
    2012 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2012, : 149 - 153
  • [33] Android Applications and Security Breach
    Noemi Benitez-Mejia, Diana Gabriela
    Sanchez-Perez, Gabriel
    Karina Toscano-Medina, Linda
    2016 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION PROCESSING, DATA MINING, AND WIRELESS COMMUNICATIONS (DIPDMWC), 2016, : 164 - 169
  • [34] Real Time Android Ransomware Detection by Analyzed Android Applications
    Ko, Ju-Seong
    Jo, Jeong-Seok
    Kim, Deuk-Hun
    Choi, Seul-Ki
    Kwak, Jin
    2019 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATION (ICEIC), 2019, : 375 - 379
  • [35] Classifying Partial Exemplars: Seeing Less and Learning More
    Taylor, Eric G.
    Ross, Brian H.
    JOURNAL OF EXPERIMENTAL PSYCHOLOGY-LEARNING MEMORY AND COGNITION, 2009, 35 (05) : 1374 - 1380
  • [36] Decomposable Trust for Android Applications
    Fernandes, Earlence
    Aluri, Ajit
    Crowell, Alexander
    Prakash, Atul
    2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, 2015, : 343 - 354
  • [37] SteaelErgon: A Framework for Injecting Colluding Malicious Payload in Android Applications
    Casolare, Rosangela
    Ciaramella, Giovanni
    Martinelli, Fabio
    Mercaldo, Francesco
    Santone, Antonella
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [38] A SECURITY ASSESSMENT METHOD FOR ANDROID APPLICATIONS BASED ON PERMISSION MODEL
    Jiang, Danyang
    Fu, Xiangling
    Song, Maoqiang
    Cui, Yidong
    2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 701 - 705
  • [39] SEMEO: A Semantic Equivalence Analysis Framework for Obfuscated Android Applications
    Hu, Zhen
    Silva, Bruno Vieira Resende E.
    Bagheri, Hamid
    Srisa-an, Witawas
    Rothermel, Gregg
    Dinh, Jackson
    MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES, 2022, 419 : 322 - 346
  • [40] A Technique for Evaluation and Detection of Potentially Vulnerable Code in Android Applications
    Ferreira, Ricardo Luis D. M.
    dos Santos, Anderson F. P.
    Choren, Ricardo
    2017 12TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2017,