Host-based detection and analysis of Android malware: implication for privilege exploitation

Show simple item record

dc.contributor.author Ashawa, Moses
dc.contributor.author Morris, Sarah
dc.date.accessioned 2020-02-04T11:12:34Z
dc.date.available 2020-02-04T11:12:34Z
dc.date.issued 2019-06-30
dc.identifier.citation Ashawa MA, Morris S. (2019) Host-based detection and analysis of Android malware: implication for privilege exploitation. International Journal for Information Security Research, Volume 9, Issue 2, June 2019, pp. 871-880 en_UK
dc.identifier.issn 2042-4639
dc.identifier.uri https://doi.org/10.20533/ijisr.2042.4639.2019.0100
dc.identifier.uri http://dspace.lib.cranfield.ac.uk/handle/1826/15085
dc.description.abstract The Rapid expansion of mobile Operating Systems has created a proportional development in Android malware infection targeting Android which is the most widely used mobile OS. factors such Android open source platform, low-cost influence the interest of malware writers targeting this mobile OS. Though there are a lot of anti-virus programs for malware detection designed with varying degrees of signatures for this purpose, many don’t give analysis of what the malware does. Some anti-virus engines give clearance during installations of repackaged malicious applications without detection. This paper collected 28 Android malware family samples with a total of 163 sample dataset. A general analysis of the entire sample dataset was created given credence to their individual family samples and year discovered. A general detection and classification of the Android malware corpus was performed using K-means clustering algorithm. Detection rules were written with five major functions for automatic scanning, signature enablement, quarantine and reporting the scan results. The LMD was able to scan a file size of 2048mb and report accurately whether the file is benign or malicious. The K-means clustering algorithm used was set to 5 iteration training phases and was able to classify accurately the malware corpus into benign and malicious files. The obtained result shows that some Android families exploit potential privileges on mobile devices. Information leakage from the victim’s device without consent and payload deposits are some of the results obtained. The result calls proactive measures rather than proactive in tackling malware infection on Android based mobile devices. en_UK
dc.language.iso en en_UK
dc.publisher Infonomics Society en_UK
dc.rights Attribution-NonCommercial 4.0 International *
dc.rights.uri http://creativecommons.org/licenses/by-nc/4.0/ *
dc.title Host-based detection and analysis of Android malware: implication for privilege exploitation en_UK
dc.type Article en_UK


Files in this item

The following license files are associated with this item:

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial 4.0 International Except where otherwise noted, this item's license is described as Attribution-NonCommercial 4.0 International

Search CERES


Browse

My Account

Statistics