UPM Institutional Repository

Android malware detection using permission based static analysis


Citation

Mohd Ariffin, Noor Afiza and Casinto, Hanna Pungo (2023) Android malware detection using permission based static analysis. Journal of Advanced Research in Applied Sciences and Engineering Technology, 33 (3). 86 - 97. ISSN 2462-1943; ESSN: 2462-1943

Abstract

The increase of mobile device enhancement grows. With this development, mobile phones are supporting many programs, and everyone takes advantage of them. Nevertheless, malware applications are increasing more and more so that people can come across lots of problems. Android is a mobile operating system that is the most used on smart mobile phones. Because it is the most used and open source, it has been the target of attackers. Android security is related to the permissions allowed by users to the applications. There have been many studies on permission-based Android malware detection. In this study, a permission-based Android malware system is analyzed. Unlike other studies, we propose a permission weight approach. Each of the permissions is given a different score using this approach. Then, K-nearest Neighbor (KNN) and Na¯ve Bayes (NB) algorithms are applied, and the proposed method is compared with the previous studies and the expected experimental results of the proposed approach will be higher.


Download File

Full text not available from this repository.

Additional Metadata

Item Type: Article
Divisions: Faculty of Computer Science and Information Technology
DOI Number: https://doi.org/10.37934/araset.33.3.8697
Publisher: Semarak Ilmu Publishing
Keywords: Android; Malware detection; Static analysis; Permission weight; Industry; Innovation and infrastructure
Depositing User: Ms. Che Wa Zakaria
Date Deposited: 06 Aug 2024 06:04
Last Modified: 06 Aug 2024 06:04
Altmetrics: http://www.altmetric.com/details.php?domain=psasir.upm.edu.my&doi=10.37934/araset.33.3.8697
URI: http://psasir.upm.edu.my/id/eprint/106547
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item