Volume 3 , Issue 1 , PP: 14-20, 2020 | Cite this article as | XML | Html | PDF | Full Length Article
Dr.Sreejith Vignesh B P 1 *
Cyber attacks are prevailing to be a great headache for the technical advancements especially when dealt with mobile usage in an android application environment. For a new user, it is difficult to identify the set of harmful permissions. This could be an advantage for malware intruders to access the data or infect the mobile device by introducing malware applications. Thus the face of Cybersecurity has changed in recent times with the advent of new technologies such as the Cloud, the internet of things, mobile/wireless, and wearable technology. The technological advances in data science which help develop contemporary cybersecurity solutions are storage, computing, and behavior. In this paper, the possible investigations are done on the cyber attacks in android by adopting the various malware classification and detection techniques. Various Classifications and Detections are done on various malware prevailing in the android applications.
Android, Handheld devices, Malware Classifications and Malware Detection Techniques
1. J. Zico Kotler and Marcus A. Maloof. Learning to detect and classify malicious executables in the wild. J. Mach Learn Res., 7:2721-2744, December 2006.
2. I. Burguera, U.Z., Nadijm- Tehrani, S.: Crowroid: Behaviour –Based Malware Detection System for Android. In SPSM’11, ACM, October 2011.
3. A.Shabtai, U.Kanonov, Y.Elovici, C.Glezer, Y. Weiss: Andromaly: a behavioral malware detection framework for android devices. Journal of Intelligent Information systems 38(1) January 2011.
4. G.J. Tesauro, J.O. Kephart, and G.B. Sorkin, Neural networks for computer Virus recognition. IEEE Expert 11(4):5-6, August 1996.
5. G.Dini, F.Martinelli, A.Saracino, D.Sgandurra: MADAM:a Multilevel Anomaly Detector for Android Malware.
6. Schmidt, A.D., Peters, F., Lamour, F., Scheel, C., Camtepe, S.A, Albayrak, S.: Monitoring smartphones for anomaly detection. Mob. Netw.Appl.14(1)(2009) 92-106.
7. Mathew G. Schultz, Eleazar Eskin, Erez Zadok, and Salvatore J Stolfo. Data Mining methods for detection of new malicious executables IEEE Symposium on Security and Privacy, IEEE Computer Society.
8. Mohd Najwadi Yusoff and Aman Janatan, Optimizing Decision tree classification system using Genetic algorithm, International Journal on New Computer Architectures and their Applications 1(3): 694-713.
9. National Cyber Security Awareness Baseline Study, CyberSecurity Malaysia (October 2016)
10. Zarni Aung and Win Zaw, Detection of Android Malware Applications by using Machine Learning approaches, Proceedings of International Conference on Computer Networks and Information Technology PP:59-65.
11. Zarni Aung and Win Zaw, Permission-Based Android Malware Detection, International Journal of Scientific & Technology Research Volume 2, Issue 3, March 2013: ISSN 2277-8616.
12. SREEJITH, V. AND BABU, B.P.M.R. (2015) “Research study on various malwares its classification, detection and avoidance techniques applied in android mobile devices”, International Journal of Applied Engineering Research, Vol. 10, No. 20, pp.20184–20187, ISSN: 0973-4562.
13. SREEJITH, V. AND BABU, B.P.M.R. (2016)“Certain investigations on various algorithms that is used to classify malware and goodware in android applications”, ICTACT International Journal on Soft Computing, Vol. 7, No.1,pp.1344–1349.
14. SREEJITH, V. AND BABU, B.P.M.R. (2017) “Experimental research identifications on malware detection by embedding C4.5 algorithm and SVM in smart phones” Perspectivas em Ciencia da Informacao, v.22, sp.1, p303. , Nov. 2017 ISSN1413-9936
15. Vignesh, B.P.S. and Rajesh Babu, M. (2018) ‘Classifying the malware application in the Android-based smart phones using ensemble-ANFIS algorithm’, Int. J. Networking and Virtual Organisations, Vol. 19, Nos. 2/3/4, pp.257–269.
16. Jinyung Kim, Yongho Yoon, Kwangkeun Yi, Junbum Shin, and SWRD Center. 2012. ScanDal: Static analyzer for detecting privacy leaks in android applications.
MoST 12 (2012).
17. Diederik Kingma and Jimmy Ba. 2014. Adam: A Method for Stochastic Optimization.International Conference on Learning Representations (12 2014).
18. Shuying Liang, Weibin Sun, and Ma.hew Might. 2014. Fast .ow analysis with godel hashes. In Source Code Analysis and Manipulation (SCAM), 2014 IEEE 14th
International Working Conference on. IEEE, 225–234.
19.Yepang Liu, Chang Xu, Shing-Chi Cheung, and Valerio Terragni. 2016. Understanding and detecting wake lock misuses for android applications. In Proceedings
of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering. ACM, 396–409.
20. Laurens van der Maaten and Geo.rey Hinton. 2008. Visualizing data using t-SNE. Journal of machine learning research 9, Nov (2008), 2579–2605.
21. Vinod Nair and Geo.rey E. Hinton. 2010. Recti€ed Linear Units Improve Restricted Boltzmann Machines. In Proceedings of the 27th International Conference on International Conference on Machine Learning (ICML’10). Omnipress, USA, 807–814. h.p://dl.acm.org/citation.cfm?id=3104322.3104425
22. Vlad Niculae. [n.d.]. A library for factorization machines and polynomial networks for classi€cation and regression in Python. Retrieved 5-22-19 from h.ps://github.com/scikit-learn-contrib/polylearn
23. Damien Octeau, Daniel Luchaup, Ma.hew Dering, Somesh Jha, and Patrick McDaniel. 2015. Composite constant propagation: Application to android inter-component communication analysis. In Proceedings of the 37th International Conference on So.ware Engineering-Volume 1. IEEE Press, 77–88.
24. Lucky Onwuzurike, Enrico Mariconti, Panagiotis Andriotis, Emiliano De Cristofaro, Gordon Ross, and Gianluca Stringhini. 2019. MaMaDroid: Detecting Android
Malware by Building Markov Chains of Behavioral Models (Extended Version). ACM Trans. Priv. Secure. 22, 2, Article 14 (April 2019), 34 pages. h.ps://doi.org/10.1145/3313391
25. F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. .irion, O. Grisel, M. Blondel, P. Pre.enhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay. 2011. Scikit-learn: Machine Learning in Python. Journal of Machine Learning Research 12 (2011), 2825–2830.
26. Naser Peiravian and Xingquan Zhu. 2013. Machine learning for android malware detection using permission and api calls. In Tools with Arti€cial Intelligence (ICTAI), 2013 IEEE 25th International Conference on. IEEE, 300–305.
27. Ste.en Rendle. 2010. Factorization machines. In Data Mining (ICDM), 2010 IEEE 10th International Conference on. IEEE, 995–1000.