Publication:
Mobile malware call logs classification based on android package index (API)

Loading...
Thumbnail Image

Date

2018

Journal Title

Journal ISSN

Volume Title

Publisher

Taylor's University

Research Projects

Organizational Units

Journal Issue

Abstract

In the cyber world, the trend whereby cybercriminals exploit smartphone vulnerabilities to obtain confidential information or make financial gain is becoming more common. They inject the mobile application with malicious code to exploit the victim�s smartphone. Moreover, they exploit mobile platforms, in particular, the Android operating system, using mobile malware, without the victim�s consent. To combat this problem, this paper presents a new mobile malware call logs classification based on the Android Package Index (API). This new classification is designed to efficiently detect mobile malware attacks. The experiment was conducted in a controlled lab environment by integrating static analysis and Knowledge Data Discovery (KDD) for data cleaning, transformation, and analysis. The dataset is reverse engineered using static analysis. The data consisted of 5,560 samples from Drebin as the training dataset and 500 samples from the Google Play Store for the testing. As a result, thirty-two mobile applications from the Google Play store matched with the proposed classification for call log exploitation. The proposed call log exploitation classification can be used as a reference for other researchers with the same interest and can be further explored as the input for the formation of a mobile malware detection model. � School of Engineering, Taylor�s University.

Description

Keywords

Android package index, Call exploitation, Knowledge data discovery, Mobile malware classification, Static analysis

Citation

Collections