Please use this identifier to cite or link to this item:
http://ir.futminna.edu.ng:8080/jspui/handle/123456789/11973
Title: | Extracting Android Applications Data for Anomaly-based Malware Detection |
Authors: | Abah, Joshua Waziri, Victor Onomza Abdullahi, Muhammad Bashir Adewale, Olumide Sunday Ume, U. Arthur |
Keywords: | Android Anomaly detection Application behaviours Feature vectors Malware detection Mobile device Rooted Unrooted |
Issue Date: | 2015 |
Publisher: | Global Journals Inc. (USA) |
Citation: | Joshua Abah, Waziri O. V., Abdullahi M. B., Ume U. A. and Adewale O. S. Extracting Android Applications Data for Anomaly-based Malware Detection. Global Journal of Computer Science and Technology: ENetwork, Web & Security, ISSN: 0975-4172 (Online) & ISSN: 0975-4350 (Print), Vol. 15, No. 5-E, Version 1.0, 2015, pp. 15-22. |
Series/Report no.: | Vol. 15 Issue 5; |
Abstract: | In order to apply any machine learning algorithm or classifier, it is fundamentally important to first and foremost collect relevant features. This is most important in the field of dynamic analysis approach to anomaly malware detection systems. In this approach, the behaviour patterns of applications while in execution are analysed. The behaviour features that Android as a system allows access permissions to depend on the type of device; either rooted or not. Android is based on the Linux kernel at the bottom layer, all layers on top of the kernel run without privileged mode. Thus, if a behaviour feature vector is created from features of Android (Application Programming Interface) API in unrooted mode, then only system information made available by Android can be used. In this paper, a Device Monitoring system for an unrooted device is developed and used to collect Android application data. The application data is used to build feature vectors that describes the Android application behaviour for Anomaly malware detection. This application is able to collect essential information from Android application such as installed applications and services running within the device before or after the Monitoring application was started, the date/time stamp, calls initiated from the device, calls received by the device, sent short message services (SMSs), SMSs received, and the status of the device as at when the event took place. This information is logged in a comma separated value (.csv) file format and stored on the SDcard of the device. The .csv file is converted to attribute relation file format (.arff); the format acceptable by WEKA machine learning tool. This .arff file of feature vectors is then used as input to the Classifier in the Android malware detection system. |
URI: | http://repository.futminna.edu.ng:8080/jspui/handle/123456789/11973 |
ISSN: | 0975-4172 0975-4350 |
Appears in Collections: | Computer Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
2015 Extracting Android Applications Data for Anomaly-based Malware Detection.pdf | 424.17 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.