Affiliation:
1. Vellore Institute of Technology, Vellore, India
Abstract
Malware attacks are broadly disguised as useful applications. Many android apps, downloaded to perform crucial tasks or play games (take one's pick), seem to do completely different tasks, which are potentially harmful and invasive in nature. This could include sending text messages to random users, exporting the phone's contacts, etc. There exist some algorithms in place that can detect these malwares, but so far, it has been observed that many of these algorithms suffer from false negatives, which grossly reduced the effectiveness of said algorithms. The aim of this chapter is to introduce a flexible method to detect if a certain application is malware or not. The working can be loosely defined as the source of a set of applications is detected and the list of permissions is studied. The set of relevant and highly close applications is selected, and from the most relevant category, the permissions are checked for overlap to see if it can be stated as a possible anomalous application.
Reference8 articles.
1. Large-scale malware classification using random projections and neural networks
2. A density-based algorithm for discovering clusters in large spatial databases with noise;M.Ester;KDD-96 Proceedings,1996
3. Neural Network and Artificial Immune Systems for Malware and Network Intrusion Detection
4. Idika & Mathur. (2007). A survey of malware detection techniques. Purdue University.