Modeling correlation between android permissions based on threat and protection level using exploratory factor plane analysis

dc.contributor.authorAshawa, Moses
dc.contributor.authorMorris, Sarah
dc.date.accessioned2022-01-24T12:50:10Z
dc.date.available2022-01-24T12:50:10Z
dc.date.issued2021-11-30
dc.description.abstractThe evolution of mobile technology has increased correspondingly with the number of attacks on mobile devices. Malware attack on mobile devices is one of the top security challenges the mobile community faces daily. While malware classification and detection tools are being developed to fight malware infection, hackers keep deploying different infection strategies, including permissions usage. Among mobile platforms, Android is the most targeted by malware because of its open OS and popularity. Permissions is one of the major security techniques used by Android and other mobile platforms to control device resources and enhance access control. In this study, we used the t-Distribution stochastic neighbor embedding (t-SNE) and Self-Organizing Map techniques to produce a visualization method using exploratory factor plane analysis to visualize permissions correlation in Android applications. Two categories of datasets were used for this study: the benign and malicious datasets. Dataset was obtained from Contagio, VirusShare, VirusTotal, and Androzoo repositories. A total of 12,267 malicious and 10,837 benign applications with different categories were used. We demonstrate that our method can identify the correlation between permissions and classify Android applications based on their protection and threat level. Our results show that every permission has a threat level. This signifies those permissions with the same protection level have the same threat level.en_UK
dc.description.sponsorshipPTDF/ED/PHD/AMA/1245/17/17: Petroleum Technology Development Fund (PTDF).en_UK
dc.identifier.citationAshawa M, Morris S. (2021) Modeling correlation between android permissions based on threat and protection level using exploratory factor plane analysis, Journal of Cybersecurity and Privacy, Volume 1, Issue 4, November 2021, pp. 704-742en_UK
dc.identifier.issn2624-800X
dc.identifier.urihttps://doi.org/10.3390/jcp1040035
dc.identifier.urihttp://dspace.lib.cranfield.ac.uk/handle/1826/17484
dc.language.isoenen_UK
dc.publisherMDPIen_UK
dc.rightsAttribution 4.0 International*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/*
dc.subjectcybersecurityen_UK
dc.subjectmobile malwareen_UK
dc.subjectfactor analysisen_UK
dc.subjectdangerous permission variablesen_UK
dc.subjectprotection levelen_UK
dc.subjectBayesian correlationen_UK
dc.subjectthreat levelen_UK
dc.titleModeling correlation between android permissions based on threat and protection level using exploratory factor plane analysisen_UK
dc.typeArticleen_UK

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Android_permissions_and_protection_level-2021.pdf
Size:
15.84 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.63 KB
Format:
Item-specific license agreed upon to submission
Description: