Publication:
Android botnet features for detection mechanism

dc.FundingDetailsUniversiti Sains Islam Malaysia,�USIM: FRGS/1/2014/ICT04/USIM/02/1,�RAGS/2013/USIM/ICT07/1 Ministry of Higher Education, Malaysia,�MOHE
dc.FundingDetailsThe authors would like to express their gratitude to Ministry of Higher Education (MOHE), Malaysia and Universiti Sains Islam Malaysia (USIM) for the support and facilities provided. This research paper is supported under Ministry of Higher Education (MOHE), Malaysia under grants: [FRGS/1/2014/ICT04/USIM/02/1] and [RAGS/2013/USIM/ICT07/1].
dc.citedby1
dc.contributor.affiliationsIslamic Science Institute
dc.contributor.affiliationsFaculty of Science and Technology
dc.contributor.affiliationsUniversiti Sains Islam Malaysia (USIM)
dc.contributor.authorHashim H.A.-B.en_US
dc.contributor.authorSaudi M.M.en_US
dc.contributor.authorBasir N.en_US
dc.date.accessioned2024-05-29T01:55:43Z
dc.date.available2024-05-29T01:55:43Z
dc.date.issued2017
dc.description.abstractAndroid has dominated the smartphone market share with 82.8% compared to other platforms such as iOS, Windows, Blackberry OS and others in the world. This growth makes the android being most targeted by mobile malwares. There are many ways to infect users with malicious applications such as by uploading the infected apps at the third party store, repackaged application and drive-by-download. This paper presents the commonly and widely used of permissions and APIs by the mobile botnet to exploit the smartphones. Experiment has been conducted in a controlled lab environment and by doing static analysis and reverse engineered the apps source code. The identified permissions and APIs in this experiment are crucial prior forming the mobile botnet detection model. � 2017 American Scientific Publishers All rights reserved.
dc.description.natureFinalen_US
dc.identifier.doi10.1166/asl.2017.7366
dc.identifier.epage5317
dc.identifier.issn19366612
dc.identifier.issue6
dc.identifier.scopus2-s2.0-85027849164
dc.identifier.spage5314
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85027849164&doi=10.1166%2fasl.2017.7366&partnerID=40&md5=9c2ad5d80d8ea80a1ee360dc4d937c92
dc.identifier.urihttps://oarep.usim.edu.my/handle/123456789/9744
dc.identifier.volume23
dc.languageEnglish
dc.language.isoen_US
dc.publisherAmerican Scientific Publishersen_US
dc.relation.ispartofAdvanced Science Letters
dc.sourceScopus
dc.subjectAndroiden_US
dc.subjectAndroid permissions API callsen_US
dc.subjectMobile botnet detectionen_US
dc.subjectStatic analysisen_US
dc.titleAndroid botnet features for detection mechanism
dc.typeArticleen_US
dspace.entity.typePublication

Files

Collections