Host-based detection and analysis of Android malware: implication for privilege exploitation

dc.contributor.authorAshawa, Moses
dc.contributor.authorMorris, Sarah
dc.date.accessioned2020-02-04T11:12:34Z
dc.date.available2020-02-04T11:12:34Z
dc.date.issued2019-06-30
dc.description.abstractThe Rapid expansion of mobile Operating Systems has created a proportional development in Android malware infection targeting Android which is the most widely used mobile OS. factors such Android open source platform, low-cost influence the interest of malware writers targeting this mobile OS. Though there are a lot of anti-virus programs for malware detection designed with varying degrees of signatures for this purpose, many don’t give analysis of what the malware does. Some anti-virus engines give clearance during installations of repackaged malicious applications without detection. This paper collected 28 Android malware family samples with a total of 163 sample dataset. A general analysis of the entire sample dataset was created given credence to their individual family samples and year discovered. A general detection and classification of the Android malware corpus was performed using K-means clustering algorithm. Detection rules were written with five major functions for automatic scanning, signature enablement, quarantine and reporting the scan results. The LMD was able to scan a file size of 2048mb and report accurately whether the file is benign or malicious. The K-means clustering algorithm used was set to 5 iteration training phases and was able to classify accurately the malware corpus into benign and malicious files. The obtained result shows that some Android families exploit potential privileges on mobile devices. Information leakage from the victim’s device without consent and payload deposits are some of the results obtained. The result calls proactive measures rather than proactive in tackling malware infection on Android based mobile devices.en_UK
dc.identifier.citationAshawa MA, Morris S. (2019) Host-based detection and analysis of Android malware: implication for privilege exploitation. International Journal for Information Security Research, Volume 9, Issue 2, June 2019, pp. 871-880en_UK
dc.identifier.issn2042-4639
dc.identifier.urihttps://doi.org/10.20533/ijisr.2042.4639.2019.0100
dc.identifier.urihttp://dspace.lib.cranfield.ac.uk/handle/1826/15085
dc.language.isoenen_UK
dc.publisherInfonomics Societyen_UK
dc.rightsAttribution-NonCommercial 4.0 International*
dc.rights.urihttp://creativecommons.org/licenses/by-nc/4.0/*
dc.titleHost-based detection and analysis of Android malware: implication for privilege exploitationen_UK
dc.typeArticleen_UK

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Host-based_detection_and_analysis_of_android_malware-2019.pdf
Size:
5.73 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.63 KB
Format:
Item-specific license agreed upon to submission
Description: