2016
DOI: 10.14429/dsj.66.10803
|View full text |Cite
|
Sign up to set email alerts
|

An Android Malware Detection Framework-based on Permissions and Intents

Abstract: With an exponential growth in smartphone applications targeting useful services such as banks, healthcare, m-commerce, security has become a primary concern. The applications downloaded from unofficial sources pose a security threat as they lack mechanisms for validation of the applications. The malware infected applications may lead to several threats such as leaking user's private information, enforcing malicious deductions for sending premium SMS, getting root privilege of the android system and so on. Exis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(15 citation statements)
references
References 5 publications
0
15
0
Order By: Relevance
“…After that, machine learning classification algorithms have been used for classifying the apps to multiple classes. Moreover, in [114], a hybrid classification method has been proposed to classify Android apps using k-means algorithm as a clustering phase followed by the J48 and ID 3 classifiers as a classifying phase. Also, the K-means clustering algorithm has been used with some classification algorithms in [78].…”
Section: Clustering Algorithms This Type Of Algorithms Ismentioning
confidence: 99%
See 2 more Smart Citations
“…After that, machine learning classification algorithms have been used for classifying the apps to multiple classes. Moreover, in [114], a hybrid classification method has been proposed to classify Android apps using k-means algorithm as a clustering phase followed by the J48 and ID 3 classifiers as a classifying phase. Also, the K-means clustering algorithm has been used with some classification algorithms in [78].…”
Section: Clustering Algorithms This Type Of Algorithms Ismentioning
confidence: 99%
“…It is worth noted that, we classified the works which use pattern matching method such as [52,118] under the signature-based works. Moreover, the 'Combination' sub section in the machine learning section indicates to the works which used both of supervised and unsupervised machine learning algorithms, such as [113,114].…”
Section: Clustering Algorithms This Type Of Algorithms Ismentioning
confidence: 99%
See 1 more Smart Citation
“…The increased usage of smart phones can be combined with tremendous increase in the security breaches due to the exploitation of the increasing number of android application related vulnerabilities [1]. Faruki et al [2] presented an overview on the current malware trends. Malware analysis generally uses static, dynamic, and hybrid methods for analysis.…”
Section: Related Workmentioning
confidence: 99%
“…The growth of android application malware has been made possible by the free application market for the Android OS [9]. The most severe and important threat to the Android OS arises as a result of malicious applications especially from unauthorized applications market that can easily be installed on any phone [9]. Android applications depend on users to grant permission to work optimally.…”
Section: Introductionmentioning
confidence: 99%