Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/11973
Title: Extracting Android Applications Data for Anomaly-based Malware Detection
Authors: Abah, Joshua
Waziri, Victor Onomza
Abdullahi, Muhammad Bashir
Adewale, Olumide Sunday
Ume, U. Arthur
Keywords: Android
Anomaly detection
Application behaviours
Feature vectors
Malware detection
Mobile device
Rooted
Unrooted
Issue Date: 2015
Publisher: Global Journals Inc. (USA)
Citation: Joshua Abah, Waziri O. V., Abdullahi M. B., Ume U. A. and Adewale O. S. Extracting Android Applications Data for Anomaly-based Malware Detection. Global Journal of Computer Science and Technology: ENetwork, Web & Security, ISSN: 0975-4172 (Online) & ISSN: 0975-4350 (Print), Vol. 15, No. 5-E, Version 1.0, 2015, pp. 15-22.
Series/Report no.: Vol. 15 Issue 5;
Abstract: In order to apply any machine learning algorithm or classifier, it is fundamentally important to first and foremost collect relevant features. This is most important in the field of dynamic analysis approach to anomaly malware detection systems. In this approach, the behaviour patterns of applications while in execution are analysed. The behaviour features that Android as a system allows access permissions to depend on the type of device; either rooted or not. Android is based on the Linux kernel at the bottom layer, all layers on top of the kernel run without privileged mode. Thus, if a behaviour feature vector is created from features of Android (Application Programming Interface) API in unrooted mode, then only system information made available by Android can be used. In this paper, a Device Monitoring system for an unrooted device is developed and used to collect Android application data. The application data is used to build feature vectors that describes the Android application behaviour for Anomaly malware detection. This application is able to collect essential information from Android application such as installed applications and services running within the device before or after the Monitoring application was started, the date/time stamp, calls initiated from the device, calls received by the device, sent short message services (SMSs), SMSs received, and the status of the device as at when the event took place. This information is logged in a comma separated value (.csv) file format and stored on the SDcard of the device. The .csv file is converted to attribute relation file format (.arff); the format acceptable by WEKA machine learning tool. This .arff file of feature vectors is then used as input to the Classifier in the Android malware detection system.
URI: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/11973
ISSN: 0975-4172
0975-4350
Appears in Collections:Computer Science

Files in This Item:
File Description SizeFormat 
2015 Extracting Android Applications Data for Anomaly-based Malware Detection.pdf424.17 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.