Android Mobile Malware Classification Based on System Call and Permission Using Tokenization
The increasing number of the smartphone over the last few years reflects an impressive growth in the number of sophisticated malicious applications targeting the smartphone users. Besides that, the current mobile malware classification and detection approaches produced inconsistent patterns' st...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | en_US |
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-usim-ddms-12556 |
---|---|
record_format |
uketd_dc |
spelling |
my-usim-ddms-125562024-05-29T04:19:43Z Android Mobile Malware Classification Based on System Call and Permission Using Tokenization Intan Nurfarahin Binti Ahmad The increasing number of the smartphone over the last few years reflects an impressive growth in the number of sophisticated malicious applications targeting the smartphone users. Besides that, the current mobile malware classification and detection approaches produced inconsistent patterns' string size which can lead to matching complexity between data thus, the new advanced malware exploitation and threat are hard to be detected. Therefore, system call and permission are extracted from the dataset which are based on call log exploitation and a new mobile malware classification based on tokenization is developed. The experiment is conducted by using the static and dynamic approaches in a controlled lab and by using open source software. 5560 dataset from Drebin were used as training dataset and 500 anonymous dataset from Google Play store were used as a testing dataset. Based on the experiment conducted, 464 of new mobile malware classifications based on tokenization have been developed. Then these classifications are transformed and tested by using WEKA by applying 4 different machine learning algorithms which are SVM, Random Forest Naive Bayes and 548. As a result, Naive Bayes outperforms the rest of the algorithms with 99.86% of accuracy rate. This new classification can be used as a guidance and reference for other researchers with the same interest. For future work, this new classification can be used as a basis to build a new model to detect mobile attacks exploitation via call log exploitation. Universiti Sains Islam Malaysia 2018-01 Thesis en_US https://oarep.usim.edu.my/handle/123456789/12556 https://oarep.usim.edu.my/bitstreams/f879862c-ea74-41d9-8531-b725c41bea17/download 8a4605be74aa9ea9d79846c1fba20a33 Mobile Malware Classification, Tokenization, System Call, Mobile applications Smartphone -- Security |
institution |
Universiti Sains Islam Malaysia |
collection |
USIM Institutional Repository |
language |
en_US |
topic |
Mobile Malware Classification Tokenization System Call, Mobile applications Smartphone -- Security |
spellingShingle |
Mobile Malware Classification Tokenization System Call, Mobile applications Smartphone -- Security Intan Nurfarahin Binti Ahmad Android Mobile Malware Classification Based on System Call and Permission Using Tokenization |
description |
The increasing number of the smartphone over the last few years reflects an impressive growth in the number of sophisticated malicious applications targeting the smartphone users. Besides that, the current mobile malware classification and detection approaches produced inconsistent patterns' string size which can lead to matching complexity between data thus, the new advanced malware exploitation and threat are hard to be detected. Therefore, system call and permission are extracted from the dataset which are based on call log exploitation and a new mobile malware classification based on tokenization is developed. The experiment is conducted by using the static and dynamic
approaches in a controlled lab and by using open source software. 5560 dataset from Drebin were used as training dataset and 500 anonymous dataset from Google Play store were used as a testing dataset. Based on the experiment conducted, 464 of new mobile malware classifications based on tokenization have been developed. Then these classifications are transformed and tested by using WEKA by applying 4 different machine learning algorithms which are SVM, Random Forest Naive Bayes and 548. As a result, Naive Bayes outperforms the rest of the algorithms with 99.86% of accuracy rate. This new classification can be used as a guidance and reference for other researchers with the same interest. For future work, this new classification can be used as a basis to build a new model to detect mobile attacks exploitation via call log exploitation. |
format |
Thesis |
author |
Intan Nurfarahin Binti Ahmad |
author_facet |
Intan Nurfarahin Binti Ahmad |
author_sort |
Intan Nurfarahin Binti Ahmad |
title |
Android Mobile Malware Classification Based on System Call and Permission Using Tokenization |
title_short |
Android Mobile Malware Classification Based on System Call and Permission Using Tokenization |
title_full |
Android Mobile Malware Classification Based on System Call and Permission Using Tokenization |
title_fullStr |
Android Mobile Malware Classification Based on System Call and Permission Using Tokenization |
title_full_unstemmed |
Android Mobile Malware Classification Based on System Call and Permission Using Tokenization |
title_sort |
android mobile malware classification based on system call and permission using tokenization |
granting_institution |
Universiti Sains Islam Malaysia |
_version_ |
1812444874898669568 |