Android Mobile Malware Classification Based on System Call and Permission Using Tokenization

The increasing number of the smartphone over the last few years reflects an impressive growth in the number of sophisticated malicious applications targeting the smartphone users. Besides that, the current mobile malware classification and detection approaches produced inconsistent patterns' st...

Full description

Saved in:
Bibliographic Details
Main Author: Intan Nurfarahin Binti Ahmad
Format: Thesis
Language:en_US
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-usim-ddms-12556
record_format uketd_dc
spelling my-usim-ddms-125562024-05-29T04:19:43Z Android Mobile Malware Classification Based on System Call and Permission Using Tokenization Intan Nurfarahin Binti Ahmad The increasing number of the smartphone over the last few years reflects an impressive growth in the number of sophisticated malicious applications targeting the smartphone users. Besides that, the current mobile malware classification and detection approaches produced inconsistent patterns' string size which can lead to matching complexity between data thus, the new advanced malware exploitation and threat are hard to be detected. Therefore, system call and permission are extracted from the dataset which are based on call log exploitation and a new mobile malware classification based on tokenization is developed. The experiment is conducted by using the static and dynamic approaches in a controlled lab and by using open source software. 5560 dataset from Drebin were used as training dataset and 500 anonymous dataset from Google Play store were used as a testing dataset. Based on the experiment conducted, 464 of new mobile malware classifications based on tokenization have been developed. Then these classifications are transformed and tested by using WEKA by applying 4 different machine learning algorithms which are SVM, Random Forest Naive Bayes and 548. As a result, Naive Bayes outperforms the rest of the algorithms with 99.86% of accuracy rate. This new classification can be used as a guidance and reference for other researchers with the same interest. For future work, this new classification can be used as a basis to build a new model to detect mobile attacks exploitation via call log exploitation. Universiti Sains Islam Malaysia 2018-01 Thesis en_US https://oarep.usim.edu.my/handle/123456789/12556 https://oarep.usim.edu.my/bitstreams/f879862c-ea74-41d9-8531-b725c41bea17/download 8a4605be74aa9ea9d79846c1fba20a33 Mobile Malware Classification, Tokenization, System Call, Mobile applications Smartphone -- Security
institution Universiti Sains Islam Malaysia
collection USIM Institutional Repository
language en_US
topic Mobile Malware Classification
Tokenization
System Call,
Mobile applications
Smartphone -- Security
spellingShingle Mobile Malware Classification
Tokenization
System Call,
Mobile applications
Smartphone -- Security
Intan Nurfarahin Binti Ahmad
Android Mobile Malware Classification Based on System Call and Permission Using Tokenization
description The increasing number of the smartphone over the last few years reflects an impressive growth in the number of sophisticated malicious applications targeting the smartphone users. Besides that, the current mobile malware classification and detection approaches produced inconsistent patterns' string size which can lead to matching complexity between data thus, the new advanced malware exploitation and threat are hard to be detected. Therefore, system call and permission are extracted from the dataset which are based on call log exploitation and a new mobile malware classification based on tokenization is developed. The experiment is conducted by using the static and dynamic approaches in a controlled lab and by using open source software. 5560 dataset from Drebin were used as training dataset and 500 anonymous dataset from Google Play store were used as a testing dataset. Based on the experiment conducted, 464 of new mobile malware classifications based on tokenization have been developed. Then these classifications are transformed and tested by using WEKA by applying 4 different machine learning algorithms which are SVM, Random Forest Naive Bayes and 548. As a result, Naive Bayes outperforms the rest of the algorithms with 99.86% of accuracy rate. This new classification can be used as a guidance and reference for other researchers with the same interest. For future work, this new classification can be used as a basis to build a new model to detect mobile attacks exploitation via call log exploitation.
format Thesis
author Intan Nurfarahin Binti Ahmad
author_facet Intan Nurfarahin Binti Ahmad
author_sort Intan Nurfarahin Binti Ahmad
title Android Mobile Malware Classification Based on System Call and Permission Using Tokenization
title_short Android Mobile Malware Classification Based on System Call and Permission Using Tokenization
title_full Android Mobile Malware Classification Based on System Call and Permission Using Tokenization
title_fullStr Android Mobile Malware Classification Based on System Call and Permission Using Tokenization
title_full_unstemmed Android Mobile Malware Classification Based on System Call and Permission Using Tokenization
title_sort android mobile malware classification based on system call and permission using tokenization
granting_institution Universiti Sains Islam Malaysia
_version_ 1812444874898669568