Open Access Open Access  Restricted Access Subscription Access

A Method for Identifying Different Android Applications: An Overview

Saurabh .

Abstract


In this paper, a man-made intelligence approach for area of poisonous applications in an Android working structure is proposed. Nowadays, android is a greatest working structure used by social classes all over and its clients are at this point creating bit by bit. As android is used for a gigantic scope by its clients and in light of its pervasiveness, the harmful applications are moreover creating to hurt the structure or to use the singular information of an android client. A continuous report by Google said that the association perceived the vast majority of utilizations with vindictive substance before anyone could present them. The execution of pernicious application ID mechanical assembly separate the association between structure limits, sensitive approvals and fragile application programming points of interaction. The particular man-made intelligence technique, Network Search and SVM Calculation is performed to analyze the result that can perceive the speed of threatening applications with a predominant viability and can work on the introduction of the structure with the computer based intelligence approach. Harmful Applications in Android

 


Full Text:

PDF

References


L. Wei et al. Machine Learning- Based Malicious Application Detection of Android

Zhenlong Yuan et al. Droid Detector: Android Malware Characterization and Detection Using Deep Learning

S. Arshad et al. SAMADroid: Novel 3-Level Hybrid Malware Detection Model for Android Operating System

P. Feng et al. Novel Dynamic Android Malware Detection System With Ensemble Learning

M F. A. Narudin et al. Evaluation of machine learning classifiers for mobile malware detection:

Aafer, Y., Du, W., & Yin, H. (2013). DroidAPIMiner: Mining API-level features for robust malware detection in android. In Security and Privacy in Communication Networks (pp. 86- 103). Springer International Publishing.

The Concept of Attack Scenarios and its Applications in Android Malware Detection: IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems

Using Security Attack Scenarios To Analyse Security During Information Systems Design

Androguard. [Online].Available: https://code.google.com/p/androguard.

M. Parkour, “Contagiodump,” 2013. [Online]. Available: http://contagiominidump.blogspot.tw/.


Refbacks

  • There are currently no refbacks.