Modeling correlation between android permissions based on threat and protection level using exploratory factor plane analysis
dc.contributor.author | Ashawa, Moses | |
dc.contributor.author | Morris, Sarah | |
dc.date.accessioned | 2022-01-24T12:50:10Z | |
dc.date.available | 2022-01-24T12:50:10Z | |
dc.date.issued | 2021-11-30 | |
dc.description.abstract | The evolution of mobile technology has increased correspondingly with the number of attacks on mobile devices. Malware attack on mobile devices is one of the top security challenges the mobile community faces daily. While malware classification and detection tools are being developed to fight malware infection, hackers keep deploying different infection strategies, including permissions usage. Among mobile platforms, Android is the most targeted by malware because of its open OS and popularity. Permissions is one of the major security techniques used by Android and other mobile platforms to control device resources and enhance access control. In this study, we used the t-Distribution stochastic neighbor embedding (t-SNE) and Self-Organizing Map techniques to produce a visualization method using exploratory factor plane analysis to visualize permissions correlation in Android applications. Two categories of datasets were used for this study: the benign and malicious datasets. Dataset was obtained from Contagio, VirusShare, VirusTotal, and Androzoo repositories. A total of 12,267 malicious and 10,837 benign applications with different categories were used. We demonstrate that our method can identify the correlation between permissions and classify Android applications based on their protection and threat level. Our results show that every permission has a threat level. This signifies those permissions with the same protection level have the same threat level. | en_UK |
dc.description.sponsorship | PTDF/ED/PHD/AMA/1245/17/17: Petroleum Technology Development Fund (PTDF). | en_UK |
dc.identifier.citation | Ashawa M, Morris S. (2021) Modeling correlation between android permissions based on threat and protection level using exploratory factor plane analysis, Journal of Cybersecurity and Privacy, Volume 1, Issue 4, November 2021, pp. 704-742 | en_UK |
dc.identifier.issn | 2624-800X | |
dc.identifier.uri | https://doi.org/10.3390/jcp1040035 | |
dc.identifier.uri | http://dspace.lib.cranfield.ac.uk/handle/1826/17484 | |
dc.language.iso | en | en_UK |
dc.publisher | MDPI | en_UK |
dc.rights | Attribution 4.0 International | * |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | * |
dc.subject | cybersecurity | en_UK |
dc.subject | mobile malware | en_UK |
dc.subject | factor analysis | en_UK |
dc.subject | dangerous permission variables | en_UK |
dc.subject | protection level | en_UK |
dc.subject | Bayesian correlation | en_UK |
dc.subject | threat level | en_UK |
dc.title | Modeling correlation between android permissions based on threat and protection level using exploratory factor plane analysis | en_UK |
dc.type | Article | en_UK |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Android_permissions_and_protection_level-2021.pdf
- Size:
- 15.84 MB
- Format:
- Adobe Portable Document Format
- Description:
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.63 KB
- Format:
- Item-specific license agreed upon to submission
- Description: