Publication: A New Android Botnet Classification for GPS Exploitation Based on Permission and API Calls
dc.Conferencecode | 204619 | |
dc.Conferencedate | 7 December 2017 through 9 December 2017 | |
dc.Conferencename | 4th International Conference on Advanced Engineering Theory and Applications, AETA 2017 | |
dc.FundingDetails | Universiti Sains Islam Malaysia: USIM/FRGS/FST/32/50114 Ministry of Higher Education, Malaysia,�MOHE | |
dc.FundingDetails | Acknowledgment. The authors would like to express their gratitude to Ministry of Higher Education (MOHE), Malaysia and Universiti Sains Islam Malaysia (USIM) for the support and facilities provided. This research paper is funded by MOHE, Malaysia under grant: [USIM/FRGS/FST/32/50114]. | |
dc.contributor.affiliations | Faculty of Science and Technology | |
dc.contributor.affiliations | Universiti Sains Islam Malaysia (USIM) | |
dc.contributor.author | Yusof M. | en_US |
dc.contributor.author | Saudi M.M. | en_US |
dc.contributor.author | Ridzuan F. | en_US |
dc.date.accessioned | 2024-05-29T01:55:04Z | |
dc.date.available | 2024-05-29T01:55:04Z | |
dc.date.issued | 2018 | |
dc.description.abstract | The target of botnet attacks has shifted from the personal computers to smartphones and mobile devices due to computational power and functionality of the mobile devices. Mobile botnet is a network consists of compromised mobile devices controlled by a botmaster through a command and control (C&C) network. Nowadays mobile botnets attacks are increasingly being used for advanced political or financial interest. Due to its popularity amongst the mobile operating system, Android has become the most targeted platform by the mobile botnets. The popularity of Android attracts the attackers to develop malicious applications with the botnet capability to hijack users� devices. In this paper, a new Android botnet classification based on GPS exploitation based on permissions and API calls is proposed using feature selection. The training was carried out using malware dataset from the Drebin and tested using 800 mobile apps from the Google Play store. The experiment was conducted using static analysis and open source tools in a controlled lab environment. This new classification can be used as a reference for other researchers in the same field to secure against GPS exploitation from Android botnet attacks. � Springer International Publishing AG 2018. | |
dc.description.nature | Final | en_US |
dc.editor | Kim S.B.Dao T.T.Zelinka I.Duy V.H.Phuong T.T. | en_US |
dc.identifier.doi | 10.1007/978-3-319-69814-4_3 | |
dc.identifier.epage | 37 | |
dc.identifier.isbn | 9783320000000 | |
dc.identifier.issn | 18761100 | |
dc.identifier.scopus | 2-s2.0-85034605681 | |
dc.identifier.spage | 27 | |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85034605681&doi=10.1007%2f978-3-319-69814-4_3&partnerID=40&md5=f8d19710779841082a4e51ed776a37dc | |
dc.identifier.uri | https://oarep.usim.edu.my/handle/123456789/9622 | |
dc.identifier.volume | 465 | |
dc.language | English | |
dc.language.iso | en_US | |
dc.publisher | Springer Verlag | en_US |
dc.relation.ispartof | Lecture Notes in Electrical Engineering | |
dc.source | Scopus | |
dc.subject | Android smartphone | en_US |
dc.subject | Machine learning | en_US |
dc.subject | Mobile botnet | en_US |
dc.subject | Mobile botnet classification | en_US |
dc.subject | Static analysis | en_US |
dc.subject | Botnet | en_US |
dc.subject | Computation theory | en_US |
dc.subject | Learning systems | en_US |
dc.subject | Malware | en_US |
dc.subject | Personal computers | en_US |
dc.subject | Smartphones | en_US |
dc.subject | Static analysis | en_US |
dc.subject | Android smartphone | en_US |
dc.subject | Command and control | en_US |
dc.subject | Computational power | en_US |
dc.subject | Google plays | en_US |
dc.subject | Mobile apps | en_US |
dc.subject | Mobile botnets | en_US |
dc.subject | Mobile operating systems | en_US |
dc.subject | Open source tools | en_US |
dc.title | A New Android Botnet Classification for GPS Exploitation Based on Permission and API Calls | |
dc.type | Conference Paper | en_US |
dspace.entity.type | Publication |