SlideShare a Scribd company logo
1 of 4
Download to read offline
*Corresponding Author: Chetan J. Shelke, Email: gaurav.wankhade487@gmail.com
RESEARCH ARTICLE
www.ajcse.info
Asian Journal of Computer Science Engineering2016; 2(2):24-27
Permission based malware detection by using k means algorithm in Android OS
1
Chetan J. Shelke*, 2
Pravin Karde, 3
V. M. Thakre
1
Asst. Professor, Dept. of IT, P.R. Patil College of Engineering, Amravati, India
2
Asst. Professor, Dept of IT, Govt. Polytechnic, Amravati, India
3
HOD, Dept. of Computer science SGBAU Amravati University Amravati, India
Received on: 31/01/2017, Revised on: 28/02/2017, Accepted on: 20/03/2017
ABSTRACT
In the developing market now a day’s cashless transaction are increasing day by day same time it’s
difficult to manage security while online transaction through android phone as the many application
downloaded from market which is freely available may leak private information or some important
information like banking transaction details ,bank account number ,etc ,now a day’s smart phones are
vulnerable for app containing malware ,camera based attack ,SMS based attack may steal your private
information .permission based method for malware detection is presented to detect malware from app.
decision can be taken that downloaded app is malicious or not is done by k means algorithm k means
algorithm form a cluster to classify malicious app .the proposed methodology is useful when the
signature of app is not present in malware dataset .system describe the process of extracting features of
android apk file in order to detect the malware by using android manifest file. The main aim of this
proposed system is to develop an accessible and comprehensive Eclipse structure application, can
potentially able to check which applications are using malicious permission or requesting for that
permission.
Keywords— Android OS, Smart phones, Malwares, permission, Applications Security.
INTRODUCTION
Smartphone are helpless to malicious attack the
small size of android devices, fond of with
people’s hasty procedure, increase the probability
of malicious software injection onto smart phones.
They can be compromised in three respects:
confidentiality, integrity, and availability
[3]
.technological safety measures, such as
firewalls, antivirus, and encryption, are infrequent
on mobile phones, and mobile phone operating
systems are not rationalized as commonly as those
on personal computers. Mobile social networking
applications sometimes lack the detailed privacy
controls of their PC counterparts. Recent
innovations in mobile commerce have enabled
users to conduct many transactions from their
Smartphone, such as purchasing goods and
applications over wireless networks, redeeming
coupons and tickets, banking, processing point-of-
sale payments, and even paying at cash registers.
LITERATURE REVIEW
Amir Houmansadr, Saman A. Zonouz, and Robin
Berthier [11]
have proposed a cloud-based intrusion
detection and response architecture. Its objectives
are transparent operations to the user, light
resource usage, and real-time and accurate
intrusion detection and response. AsafShabtai and
Yuval Elovici[12]
present a light-weight,
behavioural-based detection framework called
Andromaly for Android smartphones, which
realizes a Host-based Intrusion Detection System
(HIDS).Byung-Gon Chun and PetrosManiatis[13]
introduces an architecture called CloneCloud for
seamless partial off-loading of program execution
from the smartphone to a computational
infrastructure hosting smartphone clonesIker
Burguera, UrkoZurutuza, and Simin N.
Tehrani.[14]
monitors system calls of applications
on the smartphones of many users, and analyzes
these samples at a central server. Aubrey-Derrick
Schmidt, Frank Peters, Florian Lamour, and Sahin
Albayrak.[16]
demonstrate how a smartphone
running Symbian OS can be monitored to extract
features for anomaly detection. Lakshmisub
Ramanian.[17]
The architecture was analyzed in
terms of its security aspects and experimental
performance and battery measurements are
Shelke Chetan et al.  Permission based malware detection by using k means algorithm in Android OS
25
© 2015, AJCSE. All Rights Reserved.
presented, which show the benefits of such a
service in the cloud.
PERMISSION BASED DETECTION
In Permission based detection permission are
extracted from android manifest xml database is
created which contain permission required for
malicious app. system extract the permission and
then matched with permission database. Little
malicious permission is as follows
1. Broadcast_sms
2. read_sms
3. receive_sms
4. write_sms
5. read_phone
6. call_phone
7. change_configuration.
The selected features are collected into the
signature database and divided into training data
and test data and used by standard machine
learning techniques to detect the android malware
applications. In the first step we have used K-
Means clustering to obtain k disjoint clusters on
training datasets each cluster depicts a region of
similar features instances in terms of Euclidean
distances between the instances and their cluster
centroids. We consolidate Market 2011 and
Malware dataset into one dataset, and haphazardly
select some portion of this dataset as a preparation
dataset. The dataset is spoken to as (Xi,Yi),
where i= 1, 2, •••,n and
Xi speaks to a n-dimensional vector (x1,x2,
•••,xn) and Yi= –1, 1 speaks to the relating class
mark with 1 for generous and –1 for malware.
For K-implies grouping, we set the info parameter
k as the quantity of bunches, and segment the
preparation dataset that contains n application
consents into k groups.
The k groups have two qualities: the intra bunch
closeness is high, however the entomb group
similitude is low. The mean estimation of the
question comparability in a bunch is characterized
as the group similitude, which is the group
"centroid" or the focal point of gravity. We utilize
the Weighted Euclidean separation to give the
similitude between two applications. It is
processed as takes after:
Figure 1 Permission Based Detection
RESULT ANALYSIS
App name Malicious
Permissions
Non malicious permission ration
Whats App 70% 30 %
Gmail 65% 35%
Xion 75% 25 %
Face book 60% 40%
Ruing 63% 37 %
Table 1: Permission based Monitoring for spy detection
Figure 1 Result Analysis
0
20
40
60
80
Malicious
Non-Malicious
AJCSE,
Mar-Apr,
2017,
Vol.
2,
Issue
2
Shelke Chetan et al.  Permission based malware detection by using k means algorithm in Android OS
26
© 2015, AJCSE. All Rights Reserved.
CONCLUSION
we have implemented an secured framework by
using permission based analysis in which
permission are extracted from new application and
then compared with the database of malicious
permission if it is found more than certain level
then particular app is considered as malware app
by using k-means algorithm we can classify the
application is benign or malicious. The system can
be improved by running the feedback method,
permission based method, and signature based
method .hybrid approach of all these methodology
will enhance the result.
REFERENCES
1. Thomas Bla¨sing, Leonid Batyuk, Aubrey-
Derrick Schmidt, Seyit Ahmet Camtepe,
and Sahin Albayrak, “An Android
Application Sandbox System for
Suspicious Software
Detection”,www.dailabor.de/fileadmin/Fil
es/Publikationen/Buchdatei/Thomas_AAS
_Malware2010.pdf(retrieved at 2013-08-
20).
2. Georgios Portokalidis, Philip Homburg,
Kostas Anagnostakis, and HerbertBos.
Paranoid android: versatile protection for
smartphones. In Proceedings of the 26th
Annual Computer Security Applications
Conference, 2010.
3. Lakshmisub Ramanian. Security as a
service in cloud for smartphones. Master’s
thesis, Fraunhofer Institute for Secure
Information Technology, 2011.
4. IDC Deutschland. IDC-studie. Excerpt
available http://www.idc.de/press/presse_
mc_security2011.jsp, (retrieved at 2014-
03-13).
5. Juniper Networks Global Threat Center.
2011 malicious mobile threats
report.http://www.juniper.net/us/en/local/p
df/additional-resources/jnpr-2011-mobile-
threats-report.pdf, (retrieved at 2014-03-
13).
6. Sven Bugiel, Lucas Davi, Alexandra
Dmitrienko, Thomas Fischer, and Ahmad-
Reza Sadeghi. Xmandroid: A new android
evolution to mitigate privilege escalation
at- tacks. Technical report, Technische
Universit¨at Darmstadt, 2011.
7. AVG Mobilation. Antivirus
free. https://play.google.com/store/apps/ de
tails?id=com.antivirus, (retrieved at 2014-
03-13).
8. Ramon Llamas, Ryan Reith, and Michael
Shirer. Apple Cedes Market Share in
Smartphone Operating System Market as
Android Surges and Windows Phone
Gains, According to
IDC.http://www.idc.com/getdoc.
jsp?containerId=prUS24257413,
Aug.2013
9. Kindsight Security Labs Malware Report -
Q2 2013. Alcatel-Lucent, Jul. 2013.
10. FortiGuard Midyear Threat Report.
Fortinet, Aug. 2013.
11. Amir Houmansadr, Saman A. Zonouz, and
Robin Berthier. A cloud-based intrusion
detection and response system for mobile
phones. In Proceedings of the 2011
IEEE/IFIP 41st International Conference
on Dependable Systems and Networks
Workshops, DSNW ’11,pages 31–
32,Washington, DC, USA, 2011. IEEE
Computer Society.
12. AsafShabtai and Yuval Elovici. Applying
behavioral detection on android-based
devices. In MOBILWARE, pages 235–
249, 2010.
13. Byung Gon Chun and Petros Maniatis.
Augmented smartphone applications
through clone cloud execution. In
Proceedings of the 12th conference on Hot
topics in operating systems, 2009.
14. Iker Burguera, Urko Zurutuza, and Simin
N. Tehrani. Crowdroid: behavior-based
15. malware detection system for Android. In
Proceedings of the 1st ACM workshop on
Security and privacy in smartphones and
mobile devices, SPSM ’11, pages 15–26,
New York, NY, USA, October 2011.
ACM.
16. A D Schmidt. Detection of Smartphone
Malware. PhD thesis, Technischen
University at Berlin, 2011.
17. Aubrey-Derrick Schmidt, Frank Peters,
Florian Lamour, and Sahin Albayrak.
Monitoring smartphones for anomaly
detection. In Proceedings of the 1st
international conference on MOBILE
Wireless Middle WARE, Operating
Systems, and Applications, MOBILWARE
’08, pages 40:1–40:6, ICST, Brussels,
Belgium, Belgium, 2007. ICST (Institute
for Computer Sciences, Social-Informatics
and Telecommunications Engineering).
18. Lakshmi subRamanian. Security as a
service in cloud for smartphones. Master’s
thesis, Fraunhofer Institute for Secure
AJCSE,
Mar-Apr,
2017,
Vol.
2,
Issue
2
Shelke Chetan et al.  Permission based malware detection by using k means algorithm in Android OS
27
© 2015, AJCSE. All Rights Reserved.
Information Technology, 2011.
19. Eric Y. Chen and Mistutaka Itoh. Virtual
smartphone over ip. In Proceedings of the
2010 IEEE International Symposium on A
World of Wireless, Mobile and
Multimedia Networks (WoWMoM), 2010.
20. Jon Oberheide, Kaushik Veeraraghavan,
Evan Cooke, Jason Flinn, and Farnam
Jahanian. Virtualized In-Cloud Security
Services for Mobile Devices. In Workshop
on Virtualization in Mobile Computing
(MobiVirt ’08), Breckenridge, Colorado,
June 2008.
21. Faruki P, Bharmal A, Laxmi V, Ganmoor
V, Gaur MS, Conti M, Rajarajan M (2015)
Android security: a survey of issues,
malware penetration, and defenses.
Commun Surv Tutor IEEE 17(2):998–
1022
22. Lindorfer M, Neugschwandtner M, Platzer
C (2015) MARVIN: efficient and
comprehensive mobile app
classificationthrough static and dynamic
analysis
[J]. http://www.iseclab.org/papers/marvin_
compsac15.pdf
23. Petsas T, Voyatzis G, Athanasopoulos E,
Polychronakis M, Ioannidis S (2014) Rage
against the virtual machine: hindering
dynamic analysis of android malware, In:
Seventh European Workshop on System
Security, pp 1–6.
doi:10.1145/2592791.2592796
24. Sufatrio, Tan DJJ, Chua T-W, Vrizlynn LL
(2015) Securing android: a survey,
taxonomy, and challenges. ACM Comput.
Surv 47(4):58. doi:10.1145/2733306
25. Tam K, Khan SJ, Fattori A, Cavallaro L
(2015) CopperDroid: automatic
reconstruction of android malware
behaviors. In: Proceedings of the Network
and Distributed System Security
Symposium (NDSS’15), San Diego
.Internet Society
26. Zhauniarovich Y, Ahmad M, Gadyatskaya
O, Crispo B, Massacci F (2015) StaDynA:
addressing the problem of dynamic code
updates in the security analysis of android
applications. In: ACM Conference on Data
and Application Security and Privacy
(CODASPY).
AJCSE,
Mar-Apr,
2017,
Vol.
2,
Issue
2

More Related Content

Similar to Permission based malware detection by using k means algorithm in Android OS

Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniquesijdpsjournal
 
Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...IJECEIAES
 
Android Malware Detection
Android Malware DetectionAndroid Malware Detection
Android Malware DetectionIRJET Journal
 
Android malware detection_using_autoenco (1)
Android malware detection_using_autoenco (1)Android malware detection_using_autoenco (1)
Android malware detection_using_autoenco (1)Zahid Qaisar
 
Malware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault AnalysisMalware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault AnalysisIRJET Journal
 
I03402059063
I03402059063I03402059063
I03402059063theijes
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...eSAT Publishing House
 
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACTIEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACTtsysglobalsolutions
 
A FRAMEWORK FOR THE DETECTION OF BANKING TROJANS IN ANDROID
A FRAMEWORK FOR THE DETECTION OF BANKING TROJANS IN ANDROIDA FRAMEWORK FOR THE DETECTION OF BANKING TROJANS IN ANDROID
A FRAMEWORK FOR THE DETECTION OF BANKING TROJANS IN ANDROIDIJNSA Journal
 
Attribute-based Permission Model for Android Smartphones
Attribute-based Permission Model for Android SmartphonesAttribute-based Permission Model for Android Smartphones
Attribute-based Permission Model for Android SmartphonesIJCSIS Research Publications
 
IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...IRJET Journal
 
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
IRJET-  	  A Review on Several Vulnerabilities Detection Techniques in Androi...IRJET-  	  A Review on Several Vulnerabilities Detection Techniques in Androi...
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...IRJET Journal
 
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...IJCI JOURNAL
 
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROIDMACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROIDIRJET Journal
 
Mobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, SolutionsMobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, SolutionsCognizant
 
IRJET- Android Malware Detection System
IRJET-  	  Android Malware Detection SystemIRJET-  	  Android Malware Detection System
IRJET- Android Malware Detection SystemIRJET Journal
 

Similar to Permission based malware detection by using k means algorithm in Android OS (20)

Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniques
 
Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...
 
I018145157
I018145157I018145157
I018145157
 
Android Malware Detection
Android Malware DetectionAndroid Malware Detection
Android Malware Detection
 
OS-Project-Report-Team-8
OS-Project-Report-Team-8OS-Project-Report-Team-8
OS-Project-Report-Team-8
 
Android malware detection_using_autoenco (1)
Android malware detection_using_autoenco (1)Android malware detection_using_autoenco (1)
Android malware detection_using_autoenco (1)
 
Malware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault AnalysisMalware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault Analysis
 
I03402059063
I03402059063I03402059063
I03402059063
 
Irjet v7 i3811
Irjet v7 i3811Irjet v7 i3811
Irjet v7 i3811
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
 
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACTIEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
 
A FRAMEWORK FOR THE DETECTION OF BANKING TROJANS IN ANDROID
A FRAMEWORK FOR THE DETECTION OF BANKING TROJANS IN ANDROIDA FRAMEWORK FOR THE DETECTION OF BANKING TROJANS IN ANDROID
A FRAMEWORK FOR THE DETECTION OF BANKING TROJANS IN ANDROID
 
Attribute-based Permission Model for Android Smartphones
Attribute-based Permission Model for Android SmartphonesAttribute-based Permission Model for Android Smartphones
Attribute-based Permission Model for Android Smartphones
 
IJET-V3I1P9
IJET-V3I1P9IJET-V3I1P9
IJET-V3I1P9
 
IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...
 
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
IRJET-  	  A Review on Several Vulnerabilities Detection Techniques in Androi...IRJET-  	  A Review on Several Vulnerabilities Detection Techniques in Androi...
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
 
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
 
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROIDMACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
 
Mobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, SolutionsMobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, Solutions
 
IRJET- Android Malware Detection System
IRJET-  	  Android Malware Detection SystemIRJET-  	  Android Malware Detection System
IRJET- Android Malware Detection System
 

More from BRNSSPublicationHubI

Computational Dual-system Imaging Processing Methods for Lumbar Spine Specime...
Computational Dual-system Imaging Processing Methods for Lumbar Spine Specime...Computational Dual-system Imaging Processing Methods for Lumbar Spine Specime...
Computational Dual-system Imaging Processing Methods for Lumbar Spine Specime...BRNSSPublicationHubI
 
Prediction of Neurological Disorder using Classification Approach
Prediction of Neurological Disorder using Classification ApproachPrediction of Neurological Disorder using Classification Approach
Prediction of Neurological Disorder using Classification ApproachBRNSSPublicationHubI
 
On increasing of the Density of Elements of Field-effect Heterotransistors Fr...
On increasing of the Density of Elements of Field-effect Heterotransistors Fr...On increasing of the Density of Elements of Field-effect Heterotransistors Fr...
On increasing of the Density of Elements of Field-effect Heterotransistors Fr...BRNSSPublicationHubI
 
On Optimization of Manufacturing of Field-effect Transistors to Increase Thei...
On Optimization of Manufacturing of Field-effect Transistors to Increase Thei...On Optimization of Manufacturing of Field-effect Transistors to Increase Thei...
On Optimization of Manufacturing of Field-effect Transistors to Increase Thei...BRNSSPublicationHubI
 
The Optimization-based Approaches for Task Scheduling to Enhance the Resource...
The Optimization-based Approaches for Task Scheduling to Enhance the Resource...The Optimization-based Approaches for Task Scheduling to Enhance the Resource...
The Optimization-based Approaches for Task Scheduling to Enhance the Resource...BRNSSPublicationHubI
 
Contactless Real-Time Vital Signs Monitoring Using a Webcam
Contactless Real-Time Vital Signs Monitoring Using a WebcamContactless Real-Time Vital Signs Monitoring Using a Webcam
Contactless Real-Time Vital Signs Monitoring Using a WebcamBRNSSPublicationHubI
 
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...BRNSSPublicationHubI
 
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksBRNSSPublicationHubI
 
FPGA Hardware Design of Different LDPC Applications: Survey
FPGA Hardware Design of Different LDPC Applications: SurveyFPGA Hardware Design of Different LDPC Applications: Survey
FPGA Hardware Design of Different LDPC Applications: SurveyBRNSSPublicationHubI
 
Design and Implementation of Smart Air Pollution Monitoring System Based on I...
Design and Implementation of Smart Air Pollution Monitoring System Based on I...Design and Implementation of Smart Air Pollution Monitoring System Based on I...
Design and Implementation of Smart Air Pollution Monitoring System Based on I...BRNSSPublicationHubI
 
Smart Monitoring System for Substation’ Parameters and Automatic under Freque...
Smart Monitoring System for Substation’ Parameters and Automatic under Freque...Smart Monitoring System for Substation’ Parameters and Automatic under Freque...
Smart Monitoring System for Substation’ Parameters and Automatic under Freque...BRNSSPublicationHubI
 
An Automatic Coronavirus Detection Systems: Survey
An Automatic Coronavirus Detection Systems: SurveyAn Automatic Coronavirus Detection Systems: Survey
An Automatic Coronavirus Detection Systems: SurveyBRNSSPublicationHubI
 
Manifolds and Catastrophes for Physical Systems
Manifolds and Catastrophes for Physical SystemsManifolds and Catastrophes for Physical Systems
Manifolds and Catastrophes for Physical SystemsBRNSSPublicationHubI
 
Explore the Influencing Variables of Personality Traits on Motives of Adaptin...
Explore the Influencing Variables of Personality Traits on Motives of Adaptin...Explore the Influencing Variables of Personality Traits on Motives of Adaptin...
Explore the Influencing Variables of Personality Traits on Motives of Adaptin...BRNSSPublicationHubI
 
Use of Digital Health Technologies in HealthCare Organization: A System Persp...
Use of Digital Health Technologies in HealthCare Organization: A System Persp...Use of Digital Health Technologies in HealthCare Organization: A System Persp...
Use of Digital Health Technologies in HealthCare Organization: A System Persp...BRNSSPublicationHubI
 
A Predictive Model for Novel Corona Virus Detection with Support Vector Machine
A Predictive Model for Novel Corona Virus Detection with Support Vector MachineA Predictive Model for Novel Corona Virus Detection with Support Vector Machine
A Predictive Model for Novel Corona Virus Detection with Support Vector MachineBRNSSPublicationHubI
 
A Survey on Non-Contact Heart Rate Estimation from Facial Video
A Survey on Non-Contact Heart Rate Estimation from Facial VideoA Survey on Non-Contact Heart Rate Estimation from Facial Video
A Survey on Non-Contact Heart Rate Estimation from Facial VideoBRNSSPublicationHubI
 
Impact of Classification Algorithms on Cardiotocography Dataset for Fetal Sta...
Impact of Classification Algorithms on Cardiotocography Dataset for Fetal Sta...Impact of Classification Algorithms on Cardiotocography Dataset for Fetal Sta...
Impact of Classification Algorithms on Cardiotocography Dataset for Fetal Sta...BRNSSPublicationHubI
 
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...BRNSSPublicationHubI
 
Investigating the Relationship Between Teaching Performance and Research Perf...
Investigating the Relationship Between Teaching Performance and Research Perf...Investigating the Relationship Between Teaching Performance and Research Perf...
Investigating the Relationship Between Teaching Performance and Research Perf...BRNSSPublicationHubI
 

More from BRNSSPublicationHubI (20)

Computational Dual-system Imaging Processing Methods for Lumbar Spine Specime...
Computational Dual-system Imaging Processing Methods for Lumbar Spine Specime...Computational Dual-system Imaging Processing Methods for Lumbar Spine Specime...
Computational Dual-system Imaging Processing Methods for Lumbar Spine Specime...
 
Prediction of Neurological Disorder using Classification Approach
Prediction of Neurological Disorder using Classification ApproachPrediction of Neurological Disorder using Classification Approach
Prediction of Neurological Disorder using Classification Approach
 
On increasing of the Density of Elements of Field-effect Heterotransistors Fr...
On increasing of the Density of Elements of Field-effect Heterotransistors Fr...On increasing of the Density of Elements of Field-effect Heterotransistors Fr...
On increasing of the Density of Elements of Field-effect Heterotransistors Fr...
 
On Optimization of Manufacturing of Field-effect Transistors to Increase Thei...
On Optimization of Manufacturing of Field-effect Transistors to Increase Thei...On Optimization of Manufacturing of Field-effect Transistors to Increase Thei...
On Optimization of Manufacturing of Field-effect Transistors to Increase Thei...
 
The Optimization-based Approaches for Task Scheduling to Enhance the Resource...
The Optimization-based Approaches for Task Scheduling to Enhance the Resource...The Optimization-based Approaches for Task Scheduling to Enhance the Resource...
The Optimization-based Approaches for Task Scheduling to Enhance the Resource...
 
Contactless Real-Time Vital Signs Monitoring Using a Webcam
Contactless Real-Time Vital Signs Monitoring Using a WebcamContactless Real-Time Vital Signs Monitoring Using a Webcam
Contactless Real-Time Vital Signs Monitoring Using a Webcam
 
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...
 
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
 
FPGA Hardware Design of Different LDPC Applications: Survey
FPGA Hardware Design of Different LDPC Applications: SurveyFPGA Hardware Design of Different LDPC Applications: Survey
FPGA Hardware Design of Different LDPC Applications: Survey
 
Design and Implementation of Smart Air Pollution Monitoring System Based on I...
Design and Implementation of Smart Air Pollution Monitoring System Based on I...Design and Implementation of Smart Air Pollution Monitoring System Based on I...
Design and Implementation of Smart Air Pollution Monitoring System Based on I...
 
Smart Monitoring System for Substation’ Parameters and Automatic under Freque...
Smart Monitoring System for Substation’ Parameters and Automatic under Freque...Smart Monitoring System for Substation’ Parameters and Automatic under Freque...
Smart Monitoring System for Substation’ Parameters and Automatic under Freque...
 
An Automatic Coronavirus Detection Systems: Survey
An Automatic Coronavirus Detection Systems: SurveyAn Automatic Coronavirus Detection Systems: Survey
An Automatic Coronavirus Detection Systems: Survey
 
Manifolds and Catastrophes for Physical Systems
Manifolds and Catastrophes for Physical SystemsManifolds and Catastrophes for Physical Systems
Manifolds and Catastrophes for Physical Systems
 
Explore the Influencing Variables of Personality Traits on Motives of Adaptin...
Explore the Influencing Variables of Personality Traits on Motives of Adaptin...Explore the Influencing Variables of Personality Traits on Motives of Adaptin...
Explore the Influencing Variables of Personality Traits on Motives of Adaptin...
 
Use of Digital Health Technologies in HealthCare Organization: A System Persp...
Use of Digital Health Technologies in HealthCare Organization: A System Persp...Use of Digital Health Technologies in HealthCare Organization: A System Persp...
Use of Digital Health Technologies in HealthCare Organization: A System Persp...
 
A Predictive Model for Novel Corona Virus Detection with Support Vector Machine
A Predictive Model for Novel Corona Virus Detection with Support Vector MachineA Predictive Model for Novel Corona Virus Detection with Support Vector Machine
A Predictive Model for Novel Corona Virus Detection with Support Vector Machine
 
A Survey on Non-Contact Heart Rate Estimation from Facial Video
A Survey on Non-Contact Heart Rate Estimation from Facial VideoA Survey on Non-Contact Heart Rate Estimation from Facial Video
A Survey on Non-Contact Heart Rate Estimation from Facial Video
 
Impact of Classification Algorithms on Cardiotocography Dataset for Fetal Sta...
Impact of Classification Algorithms on Cardiotocography Dataset for Fetal Sta...Impact of Classification Algorithms on Cardiotocography Dataset for Fetal Sta...
Impact of Classification Algorithms on Cardiotocography Dataset for Fetal Sta...
 
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...
 
Investigating the Relationship Between Teaching Performance and Research Perf...
Investigating the Relationship Between Teaching Performance and Research Perf...Investigating the Relationship Between Teaching Performance and Research Perf...
Investigating the Relationship Between Teaching Performance and Research Perf...
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 

Recently uploaded (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 

Permission based malware detection by using k means algorithm in Android OS

  • 1. *Corresponding Author: Chetan J. Shelke, Email: gaurav.wankhade487@gmail.com RESEARCH ARTICLE www.ajcse.info Asian Journal of Computer Science Engineering2016; 2(2):24-27 Permission based malware detection by using k means algorithm in Android OS 1 Chetan J. Shelke*, 2 Pravin Karde, 3 V. M. Thakre 1 Asst. Professor, Dept. of IT, P.R. Patil College of Engineering, Amravati, India 2 Asst. Professor, Dept of IT, Govt. Polytechnic, Amravati, India 3 HOD, Dept. of Computer science SGBAU Amravati University Amravati, India Received on: 31/01/2017, Revised on: 28/02/2017, Accepted on: 20/03/2017 ABSTRACT In the developing market now a day’s cashless transaction are increasing day by day same time it’s difficult to manage security while online transaction through android phone as the many application downloaded from market which is freely available may leak private information or some important information like banking transaction details ,bank account number ,etc ,now a day’s smart phones are vulnerable for app containing malware ,camera based attack ,SMS based attack may steal your private information .permission based method for malware detection is presented to detect malware from app. decision can be taken that downloaded app is malicious or not is done by k means algorithm k means algorithm form a cluster to classify malicious app .the proposed methodology is useful when the signature of app is not present in malware dataset .system describe the process of extracting features of android apk file in order to detect the malware by using android manifest file. The main aim of this proposed system is to develop an accessible and comprehensive Eclipse structure application, can potentially able to check which applications are using malicious permission or requesting for that permission. Keywords— Android OS, Smart phones, Malwares, permission, Applications Security. INTRODUCTION Smartphone are helpless to malicious attack the small size of android devices, fond of with people’s hasty procedure, increase the probability of malicious software injection onto smart phones. They can be compromised in three respects: confidentiality, integrity, and availability [3] .technological safety measures, such as firewalls, antivirus, and encryption, are infrequent on mobile phones, and mobile phone operating systems are not rationalized as commonly as those on personal computers. Mobile social networking applications sometimes lack the detailed privacy controls of their PC counterparts. Recent innovations in mobile commerce have enabled users to conduct many transactions from their Smartphone, such as purchasing goods and applications over wireless networks, redeeming coupons and tickets, banking, processing point-of- sale payments, and even paying at cash registers. LITERATURE REVIEW Amir Houmansadr, Saman A. Zonouz, and Robin Berthier [11] have proposed a cloud-based intrusion detection and response architecture. Its objectives are transparent operations to the user, light resource usage, and real-time and accurate intrusion detection and response. AsafShabtai and Yuval Elovici[12] present a light-weight, behavioural-based detection framework called Andromaly for Android smartphones, which realizes a Host-based Intrusion Detection System (HIDS).Byung-Gon Chun and PetrosManiatis[13] introduces an architecture called CloneCloud for seamless partial off-loading of program execution from the smartphone to a computational infrastructure hosting smartphone clonesIker Burguera, UrkoZurutuza, and Simin N. Tehrani.[14] monitors system calls of applications on the smartphones of many users, and analyzes these samples at a central server. Aubrey-Derrick Schmidt, Frank Peters, Florian Lamour, and Sahin Albayrak.[16] demonstrate how a smartphone running Symbian OS can be monitored to extract features for anomaly detection. Lakshmisub Ramanian.[17] The architecture was analyzed in terms of its security aspects and experimental performance and battery measurements are
  • 2. Shelke Chetan et al. Permission based malware detection by using k means algorithm in Android OS 25 © 2015, AJCSE. All Rights Reserved. presented, which show the benefits of such a service in the cloud. PERMISSION BASED DETECTION In Permission based detection permission are extracted from android manifest xml database is created which contain permission required for malicious app. system extract the permission and then matched with permission database. Little malicious permission is as follows 1. Broadcast_sms 2. read_sms 3. receive_sms 4. write_sms 5. read_phone 6. call_phone 7. change_configuration. The selected features are collected into the signature database and divided into training data and test data and used by standard machine learning techniques to detect the android malware applications. In the first step we have used K- Means clustering to obtain k disjoint clusters on training datasets each cluster depicts a region of similar features instances in terms of Euclidean distances between the instances and their cluster centroids. We consolidate Market 2011 and Malware dataset into one dataset, and haphazardly select some portion of this dataset as a preparation dataset. The dataset is spoken to as (Xi,Yi), where i= 1, 2, •••,n and Xi speaks to a n-dimensional vector (x1,x2, •••,xn) and Yi= –1, 1 speaks to the relating class mark with 1 for generous and –1 for malware. For K-implies grouping, we set the info parameter k as the quantity of bunches, and segment the preparation dataset that contains n application consents into k groups. The k groups have two qualities: the intra bunch closeness is high, however the entomb group similitude is low. The mean estimation of the question comparability in a bunch is characterized as the group similitude, which is the group "centroid" or the focal point of gravity. We utilize the Weighted Euclidean separation to give the similitude between two applications. It is processed as takes after: Figure 1 Permission Based Detection RESULT ANALYSIS App name Malicious Permissions Non malicious permission ration Whats App 70% 30 % Gmail 65% 35% Xion 75% 25 % Face book 60% 40% Ruing 63% 37 % Table 1: Permission based Monitoring for spy detection Figure 1 Result Analysis 0 20 40 60 80 Malicious Non-Malicious AJCSE, Mar-Apr, 2017, Vol. 2, Issue 2
  • 3. Shelke Chetan et al. Permission based malware detection by using k means algorithm in Android OS 26 © 2015, AJCSE. All Rights Reserved. CONCLUSION we have implemented an secured framework by using permission based analysis in which permission are extracted from new application and then compared with the database of malicious permission if it is found more than certain level then particular app is considered as malware app by using k-means algorithm we can classify the application is benign or malicious. The system can be improved by running the feedback method, permission based method, and signature based method .hybrid approach of all these methodology will enhance the result. REFERENCES 1. Thomas Bla¨sing, Leonid Batyuk, Aubrey- Derrick Schmidt, Seyit Ahmet Camtepe, and Sahin Albayrak, “An Android Application Sandbox System for Suspicious Software Detection”,www.dailabor.de/fileadmin/Fil es/Publikationen/Buchdatei/Thomas_AAS _Malware2010.pdf(retrieved at 2013-08- 20). 2. Georgios Portokalidis, Philip Homburg, Kostas Anagnostakis, and HerbertBos. Paranoid android: versatile protection for smartphones. In Proceedings of the 26th Annual Computer Security Applications Conference, 2010. 3. Lakshmisub Ramanian. Security as a service in cloud for smartphones. Master’s thesis, Fraunhofer Institute for Secure Information Technology, 2011. 4. IDC Deutschland. IDC-studie. Excerpt available http://www.idc.de/press/presse_ mc_security2011.jsp, (retrieved at 2014- 03-13). 5. Juniper Networks Global Threat Center. 2011 malicious mobile threats report.http://www.juniper.net/us/en/local/p df/additional-resources/jnpr-2011-mobile- threats-report.pdf, (retrieved at 2014-03- 13). 6. Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, and Ahmad- Reza Sadeghi. Xmandroid: A new android evolution to mitigate privilege escalation at- tacks. Technical report, Technische Universit¨at Darmstadt, 2011. 7. AVG Mobilation. Antivirus free. https://play.google.com/store/apps/ de tails?id=com.antivirus, (retrieved at 2014- 03-13). 8. Ramon Llamas, Ryan Reith, and Michael Shirer. Apple Cedes Market Share in Smartphone Operating System Market as Android Surges and Windows Phone Gains, According to IDC.http://www.idc.com/getdoc. jsp?containerId=prUS24257413, Aug.2013 9. Kindsight Security Labs Malware Report - Q2 2013. Alcatel-Lucent, Jul. 2013. 10. FortiGuard Midyear Threat Report. Fortinet, Aug. 2013. 11. Amir Houmansadr, Saman A. Zonouz, and Robin Berthier. A cloud-based intrusion detection and response system for mobile phones. In Proceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops, DSNW ’11,pages 31– 32,Washington, DC, USA, 2011. IEEE Computer Society. 12. AsafShabtai and Yuval Elovici. Applying behavioral detection on android-based devices. In MOBILWARE, pages 235– 249, 2010. 13. Byung Gon Chun and Petros Maniatis. Augmented smartphone applications through clone cloud execution. In Proceedings of the 12th conference on Hot topics in operating systems, 2009. 14. Iker Burguera, Urko Zurutuza, and Simin N. Tehrani. Crowdroid: behavior-based 15. malware detection system for Android. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM ’11, pages 15–26, New York, NY, USA, October 2011. ACM. 16. A D Schmidt. Detection of Smartphone Malware. PhD thesis, Technischen University at Berlin, 2011. 17. Aubrey-Derrick Schmidt, Frank Peters, Florian Lamour, and Sahin Albayrak. Monitoring smartphones for anomaly detection. In Proceedings of the 1st international conference on MOBILE Wireless Middle WARE, Operating Systems, and Applications, MOBILWARE ’08, pages 40:1–40:6, ICST, Brussels, Belgium, Belgium, 2007. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering). 18. Lakshmi subRamanian. Security as a service in cloud for smartphones. Master’s thesis, Fraunhofer Institute for Secure AJCSE, Mar-Apr, 2017, Vol. 2, Issue 2
  • 4. Shelke Chetan et al. Permission based malware detection by using k means algorithm in Android OS 27 © 2015, AJCSE. All Rights Reserved. Information Technology, 2011. 19. Eric Y. Chen and Mistutaka Itoh. Virtual smartphone over ip. In Proceedings of the 2010 IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2010. 20. Jon Oberheide, Kaushik Veeraraghavan, Evan Cooke, Jason Flinn, and Farnam Jahanian. Virtualized In-Cloud Security Services for Mobile Devices. In Workshop on Virtualization in Mobile Computing (MobiVirt ’08), Breckenridge, Colorado, June 2008. 21. Faruki P, Bharmal A, Laxmi V, Ganmoor V, Gaur MS, Conti M, Rajarajan M (2015) Android security: a survey of issues, malware penetration, and defenses. Commun Surv Tutor IEEE 17(2):998– 1022 22. Lindorfer M, Neugschwandtner M, Platzer C (2015) MARVIN: efficient and comprehensive mobile app classificationthrough static and dynamic analysis [J]. http://www.iseclab.org/papers/marvin_ compsac15.pdf 23. Petsas T, Voyatzis G, Athanasopoulos E, Polychronakis M, Ioannidis S (2014) Rage against the virtual machine: hindering dynamic analysis of android malware, In: Seventh European Workshop on System Security, pp 1–6. doi:10.1145/2592791.2592796 24. Sufatrio, Tan DJJ, Chua T-W, Vrizlynn LL (2015) Securing android: a survey, taxonomy, and challenges. ACM Comput. Surv 47(4):58. doi:10.1145/2733306 25. Tam K, Khan SJ, Fattori A, Cavallaro L (2015) CopperDroid: automatic reconstruction of android malware behaviors. In: Proceedings of the Network and Distributed System Security Symposium (NDSS’15), San Diego .Internet Society 26. Zhauniarovich Y, Ahmad M, Gadyatskaya O, Crispo B, Massacci F (2015) StaDynA: addressing the problem of dynamic code updates in the security analysis of android applications. In: ACM Conference on Data and Application Security and Privacy (CODASPY). AJCSE, Mar-Apr, 2017, Vol. 2, Issue 2