Premium
Android application behavioural analysis for data leakage
Author(s) -
Shrivastava Gulshan,
Kumar Prabhat
Publication year - 2021
Publication title -
expert systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.365
H-Index - 38
eISSN - 1468-0394
pISSN - 0266-4720
DOI - 10.1111/exsy.12468
Subject(s) - malware , computer science , permission , android (operating system) , computer security , hacker , cryptovirology , usability , android malware , malware analysis , mobile malware , android application , operating system , political science , law
Abstract An android application requires specific permissions from the user to access the system resources and perform required functionalities. Recently, the android market has experienced exponential growth, which leads to malware applications. These applications are purposefully developed by hackers to access private data of the users and adversely affect the application usability. A suitable tool to detect malware is urgently needed, as malware may harm the user. As both malware and clean applications require similar types of permissions, so it becomes a very challenging task to differentiate between them. A novel algorithm is proposed to identify the malware‐based applications by probing the permission patterns. The proposed method uses the k‐means algorithm to quarantine the malware application by obtaining permission clusters. An efficiency of 90% (approx.) is attained for malicious behaviour, which validates this work. This work substantiates the use of application permissions for potential applications in android malware detection.