scholarly journals Detection and Prevention of Malware in Android Operating System

Author(s):  
Kashif Ali Dahri ◽  
Muhammad Saleem Vighio ◽  
Baqar Ali Zardari

The Internet is not safe anymore, malware can be discovered anywhere on the Internet. The risk of malware has increased also due to the increasing popularity and use of Smartphones and their underlying cost-free applications. With its great market share, the Android operating system has become a prime target for malware developers. When an Android phone is injected with a malware, it may result in compromising the privacy of the user by stealing sensitive and private information like contacts, ids, passwords, photos, call records, and so on. Compared to any other Android-based application category, games are the most preferred zone for attackers, due to the high interest of users in game applications. When an end user downloads a game, which is injected with malicious code, user data is infected without bringing in the knowledge of the user. Though, there still are not sufficient protection mechanisms or guidelines stated for end user against Android malware, this study offers a novel approach to detect Android malware in order to ensure the safe usage of Android applications. The advantage of this approach is its ability to utilize Android manifest files for the detection of malware. The availability of manifest file in every Android application makes this approach applicable to all Android applications. It can also be considered as a lightweight method for malware detection, and its efficiency is experimentally confirmed by testing and comparing the results of 50 Android games samples. Experiments are carried out using the Android Package Kit (APK) tools, and based on the experiments, different kinds of malware identification and prevention guidelines have been proposed for the safe and secure usage of the Android operating system.

2021 ◽  
Author(s):  
Nivedha K ◽  
Indra Gandhi K ◽  
Shibi S ◽  
Nithesh V ◽  
Ashwin M

Android is a widely distributed mobile operating system developed especially for mobile devices with touch screens. It is an open source, Google-distributed Linux-based mobile operating system. Since Android is open source, it enables Android devices to be targeted effectively by malware developers. Third-party markets do not search for malicious applications in their databases, so installing Android Application Packages (APKs) from these uncontrolled market places is often risky. Without user’s notice, these malware infected applications gain access to private user data, send text messages that costs the user, or hide malware apk file inside another application. The total number of new samples of Android malware amounted to 482,579 per month as of March 2020. In this paper deep learning approach that focuses on malware detection in android apps to protect data on user devices. We use different static features that are present in an Android application for the implementation of the proposed system. The system extracts various static features and gives them to the classifier for deep learning and shows the results. This proposed system will assist users in checking applications that are not downloaded from the official market.


Author(s):  
Luis Miguel Acosta-Guzman ◽  
Gualberto Aguilar-Torres ◽  
Gina Gallegos-Garcia

Google’s Android is the most used Operating System in mobile devices but as its popularity has increased hackers have taken advantage of the momentum to plague Google Play (Android’s Application Store) with multipurpose Malware that is capable of stealing private information and give the hacker remote control of smartphone’s features in the worst cases. This work presents an innovative methodology that helps in the process of malware detection for Android Operating System, which addresses aforementioned problem from a different perspective that even popular Anti-Malware software has left aside. It is based on the analysis of a common characteristic to all different kinds of malware: the need of network communications, so the victim device can interact with the attacker. It is important to highlight that in order to improve the security level in Android, our methodology should be considered in the process of malware detection. As main characteristic, it does not need to install additional kernel modules or to root the Android device. And finally as additional characteristic, it is as simple as can be considered for non-experienced users.


2019 ◽  
Vol 9 (2) ◽  
pp. 277 ◽  
Author(s):  
Rajesh Kumar ◽  
Xiaosong Zhang ◽  
Riaz Khan ◽  
Abubakar Sharif

With the growing era of the Internet of Things (IoT), more and more devices are connecting with the Internet using android applications to provide various services. The IoT devices are used for sensing, controlling and monitoring of different processes. Most of IoT devices use Android applications for communication and data exchange. Therefore, a secure Android permission privileged mechanism is required to increase the security of apps. According to a recent study, a malicious Android application is developed almost every 10 s. To resist this serious malware campaign, we need effective malware detection approaches to identify malware applications effectively and efficiently. Most of the studies focused on detecting malware based on static and dynamic analysis of the applications. However, to analyse the risky permission at runtime is a challenging task. In this study, first, we proposed a novel approach to distinguish between malware and benign applications based on permission ranking, similarity-based permission feature selection, and association rule for permission mining. Secondly, the proposed methodology also includes the enhancement of the random forest algorithm to improve the accuracy for malware detection. The experimental outcomes demonstrate high proficiency of the accuracy for malware detection, which is pivotal for android apps aiming for secure data exchange between IoT devices.


CCIT Journal ◽  
2014 ◽  
Vol 7 (3) ◽  
pp. 402-419
Author(s):  
Asep Saefullah ◽  
Diah Ariyani ◽  
Andy Rienauld

An age of fast-paced time is precious, be in a queue sequence is a loss. In addition to timeconsuming, the queue can also restrict other activities to do one. Likewise, when making payments at the checkout counter can be ascertained will be a queue, it needed a solution for IT ( Information Technology ) to overcome losses incurred during the waiting queue. This research is to design and create an application system that can give information about the running queue and facility reservation queue numbers to someone from anywhere via smartphones with the Android operating system. Research using the Android Developer Tools ( ADT ) Bundle suggested by the official Android developer site as a tool to help software developers build, test and debug Android applications. The design of applications using a smartphone galaxy s3 android hardware and language as a programming language as well as software eclipse helper program making. The result is a system application Queue Notifications on smartphones with Android OS, where users can take advantage of the waiting time by not waiting in line at the cash register or point of payment but the queue in the queuing system on a smartphone from anywhere while doing other activities .


2018 ◽  
Vol 10 (10) ◽  
pp. 98
Author(s):  
Prakash Hardaha ◽  
Shailendra Singh

Due to the exponential growth of the data and its services, visiting multiple webs/apps by a user raises three issues—(1) consumption of extra bytes; (2) time killing process of surfing inside the webs/apps; (3) tedious task of remembering address of webs/apps with their credentials. The data mashup is a set of techniques and user-friendly approaches which not only resolves above issues but also allows ordinary user to fetch required data from multiple disparate data sources and to create the integrated view in his defined digital place. In this paper, we have proposed an extension of existing REST protocol called Structured Data REST (SDRest) protocol and user-friendly novel approach which allows even ordinary users to develop end to end data mashup, using the innovative concept of Structured Data Mashup Box (SDMB) and One Time Configuration (OTC)-Any Time Access (ATA) models. Our implementation shows that pre-mashup configuration can easily be performed by an ordinary user and an integrated user interface view of end user data mashup can be created without any technical knowledge or programming. We have also evaluated the proposed work by comparing it with some of the related works and found that the proposed work has developed user friendly configurable approach using the current state of the art techniques to involve not only the ordinary user but also the mashup service provider and the data service provider to develop public, private and hybrid data mashup.


Author(s):  
Uma Narayanan ◽  
Varghese Paul ◽  
Shelbi Joseph

Mobile and tablets are rapidly getting the chance to be basic device in the everyday life. Android has been the most well-known versatile working structure. Regardless, inferable from the open thought of Android, amount of malware is concealed in a broad number of kind applications in Android exhibits that really undermine Android security. Deep learning is another domain of AI explore that has expanded extending thought in artificial information. In this examination, we propose to relate the features from the static examination with features from the dynamic examination of Android applications and depict malware using Deep learning systems. What's more, besides distinguishing sensitive customer data sources is fundamental for security protection in portable applications. So we propose a Novel way to deal with overseeing tremendous information examination utilizing Deep learning for the affirmation of Android malware.


2018 ◽  
Vol 7 (``11) ◽  
pp. 24397-24405
Author(s):  
A Prakash ◽  
A. Pavithra ◽  
M.Taneesh Reddy

In this investigation, we built up a versatile application that gives scatternet organize setup utilizing Bluetooth interface on advanced mobile phones running Android Operating System to meet the communication needs of individuals,   where there is no Central Access Point, the Internet or physical framework on the earth. The messages transmitted on the system are transmitted shared in a multi-hop way. Each gadget that joins the system can act both server and shopper jobs. Every gadget likewise fills in as a switch. Companions partaking in the system can take in the current condition of the system from the gadget to which they are connected as a tree structure. Along these lines, each associate takes in the current structure of the system. In the meantime, a calculation was created and executed to spread the data of the recently included gadget to all reporters the system. The created application design is planned to be utilized as an elective specialized strategy in a wide range of outside and indoor situations, in regions where normal conditions, for example, mines are hard to impart, cataclysmic event territories, protect tasks, digital fear monger assaults and running remote sensor systems.


2019 ◽  
Vol 2 (1) ◽  
pp. 53-58
Author(s):  
Akmal Nasution ◽  
Bachtiar Efendi ◽  
Iqbal Kamil Siregar

Abstract: The community service activity entitled "Training on Making Android Applications with Android Studio at junior high school 1 Tinggi Raja" aims to train existing students at junior high school 1 Tinggi Raja to create an Android application. Moreover, most students must have already had an Android phone, it would be more interesting and fun to be able to make an application on their own cellphone. The method used in this activity is a description and practice. The speaker performs explanations about Android and Android Studio itself, their functions and uses, after that the practice directly uses the Android Studio and how to build it so that it becomes an android file that can be installed on each student's cellphone. Some important points are explained and practiced in this activity, namely the introduction of the Android operating system, the introduction of Android Studio, how to design displays in Android Studio, and how to learn java coding in Android Studio so as to produce an android application.Keywords: android application, android studio, android Abstrak: Kegiatan pengabdian kepada masyarakat yang diberi judul “Pelatihan Membuat Aplikasi Android dengan Android Studio pada SMPN 1 Tinggi Raja” bertujuan untuk melatih siswa-siswi yang ada pada SMPN 1 Tinggi Raja untuk membuat aplikasi Android. Terlebih lagi para siswa juga pasti sebagian besar sudah memiliki ponsel Android, hal ini akan lebih menarik dan menyenangkan jika dapat membuat aplikasi di ponsel sendiri. Metode yang digunakan dalam kegiatan ini adalah deskripsi dan praktek. Pemateri melakukan penjelasan-penjelasan tentang Android dan Android Studio itu sendiri, fungsi dan kegunaannya, setelah itu praktek langsung menggunakan Android Studio tersebut dan bagaimana cara build nya sehingga menjadi sebuah file android yang dapat dipasang di ponsel masing-masing siswa. Beberapa point penting yang dijelaskan serta dipraktekkan dalam kegiatan ini, yaitu pengenalan sistem operasi Android, pengenalan Android Studio, cara mendesain tampilan di Android Studio, dan bagaimana belajar koding java di Android Studio sehingga menghasilkan sebuah aplikasi android.Kata kunci: aplikasi android, android studio, android


Author(s):  
Suhaib Jasim Hamdi ◽  
Naaman Omar ◽  
Adel AL-zebari ◽  
Karwan Jameel Merceedi ◽  
Abdulraheem Jamil Ahmed ◽  
...  

Mobile malware is malicious software that targets mobile phones or wireless-enabled Personal digital assistants (PDA), by causing the collapse of the system and loss or leakage of confidential information. As wireless phones and PDA networks have become more and more common and have grown in complexity, it has become increasingly difficult to ensure their safety and security against electronic attacks in the form of viruses or other malware. Android is now the world's most popular OS. More and more malware assaults are taking place in Android applications. Many security detection techniques based on Android Apps are now available. Android applications are developing rapidly across the mobile ecosystem, but Android malware is also emerging in an endless stream. Many researchers have studied the problem of Android malware detection and have put forward theories and methods from different perspectives. Existing research suggests that machine learning is an effective and promising way to detect Android malware. Notwithstanding, there exist reviews that have surveyed different issues related to Android malware detection based on machine learning. The open environmental feature of the Android environment has given Android an extensive appeal in recent years. The growing number of mobile devices, they are incorporated in many aspects of our everyday lives. In today’s digital world most of the anti-malware tools are signature based which is ineffective to detect advanced unknown malware viz. Android OS, which is the most prevalent operating system (OS), has enjoyed immense popularity for smart phones over the past few years. Seizing this opportunity, cybercrime will occur in the form of piracy and malware. Traditional detection does not suffice to combat newly created advanced malware. So, there is a need for smart malware detection systems to reduce malicious activities risk. The present paper includes a thorough comparison that summarizes and analyses the various detection techniques.


Kilat ◽  
2018 ◽  
Vol 6 (2) ◽  
pp. 112-116
Author(s):  
Redaksi Tim Jurnal

The design of basic physics aims to assist students in understanding the lessons of physics for students in particular and the general public .. This design contains basic formulas of physics, exercise problems and cases that run with the Android operating system designed specifically for smartphones and tablets, and can be done in offline, so users are not required to connect to the internet to use it. Rapid Application Design method is very well used to solve the problem of misunderstanding between users and analysts arising from the user is unable to clearly define their needs. And the analysis using Unified Modeling Language method used to perform specifications, visualization, construction, and documentation artifact a software system


Sign in / Sign up

Export Citation Format

Share Document