Publication:
Android Botnet Features for Detection Mechanism

dc.ConferencecodeUniv Malaysia Perlis, Univ Malaysia Pahang, Malaysia Tech Scientist Assoc
dc.ConferencedateAPR 19-21, 2016
dc.ConferencelocationKota Kinabalu, MALAYSIA
dc.ConferencenameInternational Conference on Computer, Communication, and Control Technology (I4CT)
dc.contributor.authorHashim, HAen_US
dc.contributor.authorSaudi, MMen_US
dc.contributor.authorBasir, Nen_US
dc.date.accessioned2024-05-29T02:57:10Z
dc.date.available2024-05-29T02:57:10Z
dc.date.issued2017
dc.description.abstractAndroid has dominated the smartphone market share with 82.8% compared to other platforms such as iOS, Windows, Blackberry OS and others in the world. This growth makes the android being most targeted by mobile malwares. There are many ways to infect users with malicious applications such as by uploading the infected apps at the third party store, repackaged application and drive-by-download. This paper presents the commonly and widely used of permissions and APIs by the mobile botnet to exploit the smartphones. Experiment has been conducted in a controlled lab environment and by doing static analysis and reverse engineered the apps source code. The identified permissions and APIs in this experiment are crucial prior forming the mobile botnet detection model.
dc.identifier.doi10.1166/asl.2017.7366
dc.identifier.epage5317
dc.identifier.isbn1936-7317
dc.identifier.issn1936-6612
dc.identifier.issue6
dc.identifier.scopusWOS:000430800000067
dc.identifier.spage5314
dc.identifier.urihttps://oarep.usim.edu.my/handle/123456789/11625
dc.identifier.volume23
dc.languageEnglish
dc.language.isoen_US
dc.publisherAmer Scientific Publishersen_US
dc.relation.ispartofAdvanced Science Letters
dc.sourceWeb Of Science (ISI)
dc.subjectAndroiden_US
dc.subjectMobile Botnet Detectionen_US
dc.subjectStatic Analysisen_US
dc.subjectAndroid Permissions API Callsen_US
dc.titleAndroid Botnet Features for Detection Mechanism
dc.typeProceedings Paperen_US
dspace.entity.typePublication

Files