Malware Attacks on Smartphones and Their Classification Based Detection

被引:0
|
作者
Gupta, Anand [1 ]
Dutta, Spandan [1 ]
Mangla, Vivek [1 ]
机构
[1] Netaji Subhas Inst Technol, Dept Comp Engn, New Delhi, India
来源
CONTEMPORARY COMPUTING | 2011年 / 168卷
关键词
Malwares; Smartphones; Resources; Malware Detection; Malware Classification;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Smartphones nowadays, with colossally large number of users have become very prominent[1]. Furthermore, this increasing prominence goes arm in arm with the rising number of malwares[2], thus making it inevitable to take cognizance of the need for an efficient malware detection mechanism. However, sundry former associated works like [3] & [4] for mal ware detection, have not cited a novel strategy which we feel can be attributed to the lack of malware classification in them. Fundamentally, classification of malwares provides a head start to the detection mechanism by curtailing the search space & the processing time of the detection mechanism. So in order to accomplish the malware classification, we develop few malwares and discuss their behavior and aftereffects on the device. And then we utilize the resource victimized by these malware on the phone as base for classification and allocate same class to those malwares that affect same resource. Finally by employing the aforementioned malware classification, we outline a strategy for their detection. Experimentation of the detection scheme on the malwares with and without classification reveals that with classification the real and CPU time consumed by detection process are almost 45% and 22% of the respective times without classification, which thus elucidates the fact that classification based malware detection in future can be employed as a propitious tool.
引用
收藏
页码:242 / 253
页数:12
相关论文
共 50 条
  • [1] Scalable Detection of Web Malware on Smartphones
    Adas, Husam
    Shetty, Sachin
    Tayib, Waled
    2015 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY RESEARCH (ICTRC), 2015, : 198 - 201
  • [2] Detection and classification of malware based on FastText
    Feng, Luming
    Cui, Yanpeng
    Hu, Jianwei
    PROCEEDINGS OF 2020 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INFORMATION SYSTEMS (ICAIIS), 2020, : 126 - 130
  • [3] Malware Detection based on Graph Classification
    Khanh-Huu-The Dam
    Touili, Tayssir
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 455 - 463
  • [4] Robotdroid: A lightweight malware detection framework on smartphones
    Zhao, Min
    Zhang, Tao
    Ge, Fangbin
    Yuan, Zhijian
    Journal of Networks, 2012, 7 (04) : 715 - 722
  • [5] On the Effectiveness of Application Characteristics in the Automatic Classification of Malware on Smartphones
    Ping, Matthew
    Alsulami, Bander
    Mancoridis, Spiros
    2016 11TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), 2016, : 75 - 82
  • [6] Research in Progress-Defending Android Smartphones from Malware Attacks
    Omar, Marwan
    Dawson, Maurice
    2013 THIRD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION TECHNOLOGIES (ACCT 2013), 2013, : 288 - 292
  • [7] Android Malware Detection Based on Functional Classification
    Fan, Wenhao
    Liu, Dong
    WU, Fan
    Tang, Bihua
    Liu, Yuan'an
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2022, E105D (03) : 656 - 666
  • [8] Adversarial Attacks on Mobile Malware Detection
    Shahpasand, Maryam
    Hamey, Len
    Vatsalan, Dinusha
    Xue, Minhui
    2019 IEEE 1ST INTERNATIONAL WORKSHOP ON ARTIFICIAL INTELLIGENCE FOR MOBILE (AI4MOBILE '19), 2019, : 17 - 20
  • [9] ON DRIVE-BY-DOWNLOAD ATTACKS AND MALWARE CLASSIFICATION
    Puttaroo, Mohammad
    Komisarczuk, Peter
    de Amorim, Renato Cordeiro
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGIES AND APPLICATIONS (ITA 13), 2013, : 217 - 225
  • [10] Malware Detection in Smartphones Using Static Detection and Evaluation Model Based on Analytic Hierarchy Process
    Zhang Miao
    Yang Youxiu
    Cheng Gong
    Dong Hang
    Li Chengze
    CHINA COMMUNICATIONS, 2012, 9 (12) : 144 - 152