Malware Attacks on Smartphones and Their Classification Based Detection

被引:0
|
作者
Gupta, Anand [1 ]
Dutta, Spandan [1 ]
Mangla, Vivek [1 ]
机构
[1] Netaji Subhas Inst Technol, Dept Comp Engn, New Delhi, India
来源
CONTEMPORARY COMPUTING | 2011年 / 168卷
关键词
Malwares; Smartphones; Resources; Malware Detection; Malware Classification;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Smartphones nowadays, with colossally large number of users have become very prominent[1]. Furthermore, this increasing prominence goes arm in arm with the rising number of malwares[2], thus making it inevitable to take cognizance of the need for an efficient malware detection mechanism. However, sundry former associated works like [3] & [4] for mal ware detection, have not cited a novel strategy which we feel can be attributed to the lack of malware classification in them. Fundamentally, classification of malwares provides a head start to the detection mechanism by curtailing the search space & the processing time of the detection mechanism. So in order to accomplish the malware classification, we develop few malwares and discuss their behavior and aftereffects on the device. And then we utilize the resource victimized by these malware on the phone as base for classification and allocate same class to those malwares that affect same resource. Finally by employing the aforementioned malware classification, we outline a strategy for their detection. Experimentation of the detection scheme on the malwares with and without classification reveals that with classification the real and CPU time consumed by detection process are almost 45% and 22% of the respective times without classification, which thus elucidates the fact that classification based malware detection in future can be employed as a propitious tool.
引用
收藏
页码:242 / 253
页数:12
相关论文
共 50 条
  • [31] Android malware detection technology based on improved Bayesian Classification
    Yu Lu
    Pan Zulie
    Liu Jingju
    Shen Yi
    2013 THIRD INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2013, : 1338 - 1341
  • [32] MADVEX: Instrumentation-Based Adversarial Attacks on Machine Learning Malware Detection
    Loose, Nils
    Maechtle, Felix
    Pott, Claudius
    Bezsmertnyi, Volodymyr
    Eisenbarth, Thomas
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2023, 2023, 13959 : 69 - 88
  • [33] Robustness of Image-based Android Malware Detection Under Adversarial Attacks
    Darwaish, Asim
    Nait-Abdesselam, Farid
    Titouna, Chafiq
    Sattar, Sumera
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,
  • [34] Gradient-Based Adversarial Attacks Against Malware Detection by Instruction Replacement
    Zhao, Jiapeng
    Liu, Zhongjin
    Zhang, Xiaoling
    Huang, Jintao
    Shi, Zhiqiang
    Lv, Shichao
    Li, Hong
    Sun, Limin
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 603 - 612
  • [35] An ensemble-based stegware detection system for information hiding malware attacks
    Monika A.
    Eswari R.
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (04) : 4401 - 4417
  • [36] Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems
    Abusnaina, Ahmed
    Khormali, Aminollah
    Alasmary, Hisham
    Park, Jeman
    Anwar, Afsah
    Mohaisen, Aziz
    2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019), 2019, : 1296 - 1305
  • [37] Adversarial Attacks Against Image-Based Malware Detection Using Autoencoders
    Carey, Alycia N.
    Mai, Huy
    Zhan, Justin
    Mehmood, Asif
    PATTERN RECOGNITION AND TRACKING XXXII, 2021, 11735
  • [38] A framework for Android Malware detection and classification
    Murtaz, Muhammad
    Azwar, Hassan
    Ali, Syed Baqir
    Rehman, Saad
    2018 5TH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING TECHNOLOGIES AND APPLIED SCIENCES (IEEE ICETAS), 2018,
  • [39] Classification of packet contents for malware detection
    Ahmed, Irfan
    Lhee, Kyung-suk
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2011, 7 (04): : 279 - 295
  • [40] DaCoMM: Detection and Classification of Metamorphic Malware
    Mehra, Vishakha
    Jain, Vinesh
    Uppal, Dolly
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 668 - 673