Malicious iOS apps detection through Multi-Criteria Decision-Making Approach

Author:

Bhatt Arpita Jadhav1ORCID,Sardana Neetu1

Affiliation:

1. Jaypee Institute of Information Technology

Abstract

Abstract Smartphones are used in daily lives because they are ubiquitous and provide internet connectivity. Their functionalities can be extended by installing third-party apps. Users are compelled to use these feature-rich apps. As a result, the menaces because of these apps have increased. Smartphones store more users’ personal than compared to data stored on desktops since they remain with individuals throughout the day making them an easy target for intruders. Apple follows permission-based access control to prevent users’ privacy. Every app declares the permission, which is notified to the user during app usage. However, the users are unaware of whether the app is breaching their privacy? To combat this problem, we propose a hybrid approach to detect malicious iOS apps based on their permissions. In the first phase, weights have been assigned to app permissions using a multi-criteria decision-making approach namely Analytic Hierarchy Process (AHP). In the second phase, machine and ensemble learning techniques have been employed for detecting malicious apps. To test the efficacy of the proposed method dataset comprising 1150 apps from 12 app categories has been used. The experimental results demonstrate the proposed approach improves the efficacy of detecting malicious iOS apps for majority of categories.

Publisher

Research Square Platform LLC

Reference17 articles.

1. Wikipedia, O. S. (accessed Apr. 06, 2021). ” https://en.wikipedia.org/wiki/IOS

2. Apple Inc (accessed Apr. 06, 2021). “App Store Downloads on iTunes.” https://apps.apple.com/in/genre/ios/id36

3. Erickson, J., Gibler, C., Crussell, J., & Chen, H. (2011). “AndroidLeaks: Detecting Privacy Leaks In Android Applications,” pp. 1–17, [Online]. Available: http://www.cs.ucdavis.edu/research/tech-reports/2011/CSE-2011-10.pdf

4. Krupp, B. (2015). “Enhancing Security And Privacy For Mobile Systems,”Dr. Diss. Dep. Electr. Comput. Eng. Clevel. State Univ., p.148,

5. Survey on mobile user’s data privacy threats and defense mechanisms;Khan J;Procedia Comput Sci,2015

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3