A Survey on Malware Detection Techniques on Linux Powered Smart Phones using Machine Learning Approaches

  • Authors

    • Mr. Rahul Y. Pawar
    • Dr C.Mahesh
    2018-09-01
    https://doi.org/10.14419/ijet.v7i3.34.18706
  • smart phones, System calls, targets, malwares, machine learning, ptrace.
  • Mobile Phone manufacturers are continuously working to take move on with rapid pace on their new models and to match with the need of customer, they need to customize their system. However the security scenarios of such practice are not that known, due to this various malware and viruses are increasing day by day and causing harm to the devices. Due to the substantial damage caused by malware in last few years certain significant efforts on developing detection and defense mechanism against malwares. For detecting such malicious applications and malwares a security system should be developed which will target such anomaly or outliers in system. In data mining anomaly detection system plays a major role by monitoring the behavior of an application and categorizing them in to normal and abnormal to detect malwares present in the system.

     

     

  • References

    1. [1] He, Daojing, Sammy Chan, and Mohsen Guizani. "Mobile application security: malware threats and defenses." IEEE Wireless Communications 22.1 (2015): 138-144.

      [2] Rasthofer, Siegfried, et al. "Droidforce: Enforcing complex, data-centric, system-wide policies in android." Availability, Reliability and Security (ARES), 2014 Ninth International Conference on. IEEE, 2014.

      [3] Rastogi, Vaibhav, Yan Chen, and Xuxian Jiang. "Catch me if you can: Evaluating android anti-malware against transformation attacks." IEEE Transactions on Information Forensics and Security 9.1 (2014): 99-108.

      [4] Bartel, Alexandre, et al. "Static analysis for extracting permission checks of a large scale framework: The challenges and solutions for analyzing android." IEEE Transactions on Software Engineering 40.6 (2014): 617-632.

      [5] Narayanan, Annamalai, et al. "Adaptive and scalable Android malware detection through online learning." Neural Networks (IJCNN), 2016 International Joint Conference on. IEEE, 2016.

      [6] Alzaylaee, Mohammed K., Suleiman Y. Yerima, and SakirSezer. "DynaLog: An automated dynamic analysis framework for characterizing Android applications." Cyber Security And Protection Of Digital Services (Cyber Security), 2016 International Conference On. IEEE, 2016.

      [7] Saracino, Andrea, et al. "Madam: Effective and efficient behavior-based android malware detection and prevention." IEEE Transactions on Dependable and Secure Computing (2016).

      [8] Medvet, Eric, and Francesco Mercaldo. "Exploring the Usage of Topic Modeling for Android Malware Static Analysis." Availability, Reliability and Security (ARES), 2016 11th International Conference on. IEEE, 2016.

      [9] Narudin, Fairuz Amalina, et al. "Evaluation of machine learning classifiers for mobile malware detection." Soft Computing 20.1 (2016): 343-357.

      [10] Zhou, Xiaoyong, et al. "The peril of fragmentation: Security hazards in android device driver customizations." Security and Privacy (SP), 2014 IEEE Symposium on. IEEE, 2014.

      [11] Allix, Kevin, et al. "A Forensic Analysis of Android Malware--How is Malware Written and How it Could Be Detected?." Computer Software and Applications Conference (COMPSAC), 2014 IEEE 38th Annual. IEEE, 2014.

      [12] Zhauniarovich, Yury, and Olga Gadyatskaya. "Small changes, big changes: an updated view on the Android permission system." International Symposium on Research in Attacks, Intrusions, and Defenses. Springer International Publishing, 2016.

      [13] Lindorfer, Martina, et al. "Andrubis--1,000,000 apps later: A view on current Android malware behaviors." Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), 2014 Third International Workshop on. IEEE, 2014.

      [14] Iqbal, MdShahrear, and Mohammad Zulkernine. "SAM: A secure anti-malware framework for the smartphone operating systems." Wireless Communications and Networking Conference (WCNC), 2016 IEEE. IEEE, 2016.

      [15] Batten, Lynn M., VeelashaMoonsamy, and MoutazAlazab. "Smartphone applications, malware and data theft." Computational Intelligence, Cyber Security and Computational Models. Springer Singapore, 2016. 15-24.

      [16] Martín, Alejandro, Héctor D. Menéndez, and David Camacho. "String-based malware detection for android environments." International Symposium on Intelligent and Distributed Computing. Springer International Publishing, 2016.

      [17] Martín, Alejandro, Héctor D. Menéndez, and David Camacho. "String-based malware detection for android environments." International Symposium on Intelligent and Distributed Computing. Springer International Publishing, 2016.

      [18] Faruki, Parvez, et al. "Android security: a survey of issues, malware penetration, and defenses." IEEE communications surveys & tutorials 17.2 (2015): 998-1022.

      [19] Allix, K., Bissyandé, T. F., Jérome, Q., Klein, J., & Le Traon, Y. (2016). Empirical assessment of machine learning-based malware detectors for Android. Empirical Software Engineering, 21(1), 183-211.

      [20] Liang, Shuang, and Xiaojiang Du. "Permission-combination-based scheme for android mobile malware detection." Communications (ICC), 2014 IEEE International Conference on. IEEE, 2014.

      [21] Cooper, Vanessa N., Hossain Shahriar, and Hisham M. Haddad. "A survey of Android malware characterisitics and mitigation techniques." Information Technology: New Generations (ITNG), 2014 11th International Conference on. IEEE, 2014.

      [22] Zheng, Min, Mingshen Sun, and John CS Lui. "DroidTrace: a ptrace based Android dynamic analysis system with forward execution capability." Wireless Communications and Mobile Computing Conference (IWCMC), 2014 International. IEEE, 2014.

      [23] Li, Li, Alexandre Bartel, Tegawend´e F. Bissyand´ e, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, Patrick McDaniel "Iccta: Detecting inter-component privacy leaks in android apps." Proceedings of the 37th International Conference on Software Engineering-Volume 1. IEEE Press, 2015.

      [24] Dash, Santanu Kumar, et al. "Droidscribe: Classifying android malware based on runtime behavior." Security and Privacy Workshops (SPW), 2016 IEEE. IEEE, 2016.

      [25] Fratantonio, Yanick, et al. "Triggerscope: Towards detecting logic bombs in android applications." Security and Privacy (SP), 2016 IEEE Symposium on. IEEE, 2016.

      [26] Zhang, Yuan, et al. "Permission use analysis for vetting undesirable behaviors in android apps." IEEE transactions on information forensics and security 9.11 (2014): 1828-1842.

      [27] Jang, Jae-wook, et al. "Detecting and classifying method based on similarity matching of Android malware behavior with profile." SpringerPlus 5.1 (2016): 273.

  • Downloads

  • How to Cite

    Rahul Y. Pawar, M., & C.Mahesh, D. (2018). A Survey on Malware Detection Techniques on Linux Powered Smart Phones using Machine Learning Approaches. International Journal of Engineering & Technology, 7(3.34), 8-14. https://doi.org/10.14419/ijet.v7i3.34.18706