Publication: Android botnet features for detection mechanism
dc.FundingDetails | Universiti Sains Islam Malaysia,�USIM: FRGS/1/2014/ICT04/USIM/02/1,�RAGS/2013/USIM/ICT07/1 Ministry of Higher Education, Malaysia,�MOHE | |
dc.FundingDetails | The authors would like to express their gratitude to Ministry of Higher Education (MOHE), Malaysia and Universiti Sains Islam Malaysia (USIM) for the support and facilities provided. This research paper is supported under Ministry of Higher Education (MOHE), Malaysia under grants: [FRGS/1/2014/ICT04/USIM/02/1] and [RAGS/2013/USIM/ICT07/1]. | |
dc.citedby | 1 | |
dc.contributor.affiliations | Islamic Science Institute | |
dc.contributor.affiliations | Faculty of Science and Technology | |
dc.contributor.affiliations | Universiti Sains Islam Malaysia (USIM) | |
dc.contributor.author | Hashim H.A.-B. | en_US |
dc.contributor.author | Saudi M.M. | en_US |
dc.contributor.author | Basir N. | en_US |
dc.date.accessioned | 2024-05-29T01:55:43Z | |
dc.date.available | 2024-05-29T01:55:43Z | |
dc.date.issued | 2017 | |
dc.description.abstract | Android has dominated the smartphone market share with 82.8% compared to other platforms such as iOS, Windows, Blackberry OS and others in the world. This growth makes the android being most targeted by mobile malwares. There are many ways to infect users with malicious applications such as by uploading the infected apps at the third party store, repackaged application and drive-by-download. This paper presents the commonly and widely used of permissions and APIs by the mobile botnet to exploit the smartphones. Experiment has been conducted in a controlled lab environment and by doing static analysis and reverse engineered the apps source code. The identified permissions and APIs in this experiment are crucial prior forming the mobile botnet detection model. � 2017 American Scientific Publishers All rights reserved. | |
dc.description.nature | Final | en_US |
dc.identifier.doi | 10.1166/asl.2017.7366 | |
dc.identifier.epage | 5317 | |
dc.identifier.issn | 19366612 | |
dc.identifier.issue | 6 | |
dc.identifier.scopus | 2-s2.0-85027849164 | |
dc.identifier.spage | 5314 | |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85027849164&doi=10.1166%2fasl.2017.7366&partnerID=40&md5=9c2ad5d80d8ea80a1ee360dc4d937c92 | |
dc.identifier.uri | https://oarep.usim.edu.my/handle/123456789/9744 | |
dc.identifier.volume | 23 | |
dc.language | English | |
dc.language.iso | en_US | |
dc.publisher | American Scientific Publishers | en_US |
dc.relation.ispartof | Advanced Science Letters | |
dc.source | Scopus | |
dc.subject | Android | en_US |
dc.subject | Android permissions API calls | en_US |
dc.subject | Mobile botnet detection | en_US |
dc.subject | Static analysis | en_US |
dc.title | Android botnet features for detection mechanism | |
dc.type | Article | en_US |
dspace.entity.type | Publication |