Permission Request Pattern Recognition in Android Malware Applications
Ahmed Ben Ayed
Additional contact information
Ahmed Ben Ayed: University of the Cumberlands, Williamsburg, KY, USA
International Journal of Strategic Information Technology and Applications (IJSITA), 2017, vol. 8, issue 1, 37-49
Abstract:
This article discusses that smartphone systems have known a huge evolution in terms of their capacities and functionalities. Therefore, they are used extensively for professional and personal work. Since smartphones became popular, cybercriminals and Malware developers have shown an extensive interest in the smartphone's system. Therefore, the protection of these devices is very important. Since Malware has to be granted some permissions to achieve its goals, the author believes those permissions could be a useful characteristic in helping detect malicious applications. However, the usefulness of such features is not yet confirmed. This research consists of an examination of three hundred eighty-seven different Android-Based Malware applications in order to determine if there is a permission request pattern. This article presents a complete analysis of permission requests in Android malicious applications using the Self-Organizing Maps.
Date: 2017
References: Add references at CitEc
Citations:
Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 18/IJSITA.2017010103 (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:igg:jsita0:v:8:y:2017:i:1:p:37-49
Access Statistics for this article
International Journal of Strategic Information Technology and Applications (IJSITA) is currently edited by Mehdi Khosrow-Pour
More articles in International Journal of Strategic Information Technology and Applications (IJSITA) from IGI Global
Bibliographic data for series maintained by Journal Editor ().