Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/11973
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAbah, Joshua-
dc.contributor.authorWaziri, Victor Onomza-
dc.contributor.authorAbdullahi, Muhammad Bashir-
dc.contributor.authorAdewale, Olumide Sunday-
dc.contributor.authorUme, U. Arthur-
dc.date.accessioned2021-07-28T12:59:51Z-
dc.date.available2021-07-28T12:59:51Z-
dc.date.issued2015-
dc.identifier.citationJoshua Abah, Waziri O. V., Abdullahi M. B., Ume U. A. and Adewale O. S. Extracting Android Applications Data for Anomaly-based Malware Detection. Global Journal of Computer Science and Technology: ENetwork, Web & Security, ISSN: 0975-4172 (Online) & ISSN: 0975-4350 (Print), Vol. 15, No. 5-E, Version 1.0, 2015, pp. 15-22.en_US
dc.identifier.issn0975-4172-
dc.identifier.issn0975-4350-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/11973-
dc.description.abstractIn order to apply any machine learning algorithm or classifier, it is fundamentally important to first and foremost collect relevant features. This is most important in the field of dynamic analysis approach to anomaly malware detection systems. In this approach, the behaviour patterns of applications while in execution are analysed. The behaviour features that Android as a system allows access permissions to depend on the type of device; either rooted or not. Android is based on the Linux kernel at the bottom layer, all layers on top of the kernel run without privileged mode. Thus, if a behaviour feature vector is created from features of Android (Application Programming Interface) API in unrooted mode, then only system information made available by Android can be used. In this paper, a Device Monitoring system for an unrooted device is developed and used to collect Android application data. The application data is used to build feature vectors that describes the Android application behaviour for Anomaly malware detection. This application is able to collect essential information from Android application such as installed applications and services running within the device before or after the Monitoring application was started, the date/time stamp, calls initiated from the device, calls received by the device, sent short message services (SMSs), SMSs received, and the status of the device as at when the event took place. This information is logged in a comma separated value (.csv) file format and stored on the SDcard of the device. The .csv file is converted to attribute relation file format (.arff); the format acceptable by WEKA machine learning tool. This .arff file of feature vectors is then used as input to the Classifier in the Android malware detection system.en_US
dc.language.isoenen_US
dc.publisherGlobal Journals Inc. (USA)en_US
dc.relation.ispartofseriesVol. 15 Issue 5;-
dc.subjectAndroiden_US
dc.subjectAnomaly detectionen_US
dc.subjectApplication behavioursen_US
dc.subjectFeature vectorsen_US
dc.subjectMalware detectionen_US
dc.subjectMobile deviceen_US
dc.subjectRooteden_US
dc.subjectUnrooteden_US
dc.titleExtracting Android Applications Data for Anomaly-based Malware Detectionen_US
dc.typeArticleen_US
Appears in Collections:Computer Science

Files in This Item:
File Description SizeFormat 
2015 Extracting Android Applications Data for Anomaly-based Malware Detection.pdf424.17 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.