CFP last date
20 December 2024
Reseach Article

Static Analysis of Android Permissions and SMS using Machine Learning Algorithms

by Sonali Kothari, Pravin Karde, Vilas Thakare
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 182 - Number 16
Year of Publication: 2018
Authors: Sonali Kothari, Pravin Karde, Vilas Thakare
10.5120/ijca2018917825

Sonali Kothari, Pravin Karde, Vilas Thakare . Static Analysis of Android Permissions and SMS using Machine Learning Algorithms. International Journal of Computer Applications. 182, 16 ( Sep 2018), 22-27. DOI=10.5120/ijca2018917825

@article{ 10.5120/ijca2018917825,
author = { Sonali Kothari, Pravin Karde, Vilas Thakare },
title = { Static Analysis of Android Permissions and SMS using Machine Learning Algorithms },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2018 },
volume = { 182 },
number = { 16 },
month = { Sep },
year = { 2018 },
issn = { 0975-8887 },
pages = { 22-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume182/number16/29948-2018917825/ },
doi = { 10.5120/ijca2018917825 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:11:37.234098+05:30
%A Sonali Kothari
%A Pravin Karde
%A Vilas Thakare
%T Static Analysis of Android Permissions and SMS using Machine Learning Algorithms
%J International Journal of Computer Applications
%@ 0975-8887
%V 182
%N 16
%P 22-27
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Everyday user receive number of SMS messages and installs number of applications on their device. A study says that every 10 seconds Android device is facing a new attack. As user is using smartphone nowadays to store personal and professional, confidential and sensitive information on smartphone, it needs to be secured. In this paper, a static analysis model is provided for network service providers. This will allow network service providers to mark SMS as spam before sending it to user. Analyzing permissions of Android application will allow app provider to identify malicious applications. This will help in reducing attacks on smartphones using applications.

References
  1. Guining Geng, Guoai Xu, Miao Zhang and Yanhui Guo, Guang Yang, Wei Cui, “The Design of SMS Based Heterogeneous Mobile Botnet”, Journal of Computers, Vol. 7, Issue 1, pp. 235-243, 2012
  2. 2. Jing Liu, Yang Xiao, Kaveh Ghaboosi, Hongmei Deng and Jingyuan Zhang, “Botnet: Classification, Attacks, Detection, Tracing, and Preventive Measures”, Hindawi Publishing Corporation, EURASIP Journal on Wireless Communications and Networking, 19 July 2009
  3. 3. Ihsan Ullah, Naveed Khan and Hatim A. Aboalsamh, “Survey on botnet: its architecture, detection, prevention and mitigation”, IEEE Transactions, pp. 660 -665, 2013
  4. 4. Mohammad Reza Faghani and Uyen Trang Nguyen, “Socellbot: a new botnet design to infect smartphones via online social Networking”, 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), IEEE, 2012.
  5. 5. Mahmoud. M, Nir. M and Matrawy. A, “A Survey on Botnet Architectures, Detection and Defences”, International Journal of Network Security, Vol. 0(0), 2013, pp:1-18.
  6. 6. Abdullah, Z., Saudi, M. M., & Anuar, N. B, Mobile botnet detection: Proof of concept. In Control and System Graduate Research Colloquium (ICSGRC), 2014 IEEE 5th, 2014, pp. 257-262
  7. Anwar, S., Zain, J. M., Inayat, Z., Haq, R. U., Karim, A., & Jabir, A. N,A static approach towards mobile botnet detection. In Electronic Design (ICED), 2016 3rd International Conference on IEEE, 2016, pp. 563-567.
  8. Amro.B, “Malware Detection Techniques for Mobile Devices”, International Journal of Mobile Network Communications & Telematics (IJMNCT), Vol.7 (4/5/6), 2017, pp: 1-10.
  9. Karim.A et al, “On the Analysis and Detection of Mobile Botnet Applications”, Journal of Universal Computer Science, Vol. 22, no. 4 (2016), pp: 567-588.
  10. SMS Corpus [online], Available: https://archive.ics.uci. edu/ml/datasets.html,[accessed on : 24/03/2018]
  11. SMS Corpus [online], Available: http://www.esp.uem. es/jmgomez/smsspamcorpus/, [accessed on : 24/03/2018]
  12. SMS Corpus [online], Available: https://www.kaggle. com /shravan3273/sms-spam, [accessed on : 24/03/2018]
  13. Xuxian Jiang , “An Evaluation of the Application ("App") Verification Service in Android 4.2” , Associate Professor, Department of Computer Science, NC State University
  14. Ting Zhao, Gang Zhang, Lei Zhang, “An Overview of Mobile Devices Security Issues and Countermeasures”, 2014 International Conference on Wireless Communication and Sensor Network, pp 439-443.
  15. Urcuqui, C., & Navarro, A. (2016, April). Machine learning classifiers for android malware analysis. In Communications and Computing (COLCOM), 2016 IEEE Colombian Conference on (pp. 1-6). IEEE.
  16. Ruchna Nigam, “Time line of Mobile Botnets”, FortiGuard Labs, https://www.botconf.eu/wp-content/uploads/2014/12/2014-2.2-A-Timeline-of-Mobile-Botnets-PAPER.pdf
  17. Koen Van Impe, “Comparing free online Malware analysis sandboxes”, June 1 2015, https://securityintelligence.com/comparing-free-online-malware-analysis-sandboxes/, [accessed on: 30/06/2018]
Index Terms

Computer Science
Information Sciences

Keywords

SMS spam ham Android permission ANN