A DNN Approach to Design a Smart Security System for Android Platform

A DNN Approach to Design a Smart Security System for Android Platform

Diptimayee Sahu, Satya Narayan Tripathy, Sisira Kumar Kapat, Soujanya Morty
DOI: 10.4018/979-8-3693-1186-8.ch001
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Malware is an extensive threat to all computing devices and involves a massive loss for end-users and corporations. This chapter gives a fundamental idea about Android malware types, the intrusion techniques used by malware, the inbuilt security models provided by Android, and the combating techniques used by malware writers to bypass anti-virus detection. Several machine and deep learning approaches have been proposed so far in the Android malware detection field, but most of them have relied on static features due to their lower cost. In this chapter, several experiments are performed using the deep neural network model and the result analysis explains the effectiveness and the limitations of different detection techniques. The experiment with static, dynamic, and hybrid detection techniques achieves an accuracy of 95.40%, 99.66%, and 87.54% respectively. Malware family classification is also conducted using static detection technique and achieved 91.54% accuracy. The content of this chapter provides a methodical way to design an effective detection system.
Chapter Preview
Top

Introduction

Malware is nothing but an application that performs some unwanted actions. Before 2004 malware were only famous among PC users but with increase in the use of Smartphone in June 2004 first mo-bile malware “Cabir” was detected in Symbian 60 OS with the ability to use the Bluetooth protocol to transfer files (F-Secure, n.d.). Since then the number is multiplying in up-tempo. Android malware are the malware targeting only android user and slightly different from windows malware. Bend towards technology making Smartphone an important part of day today life. The world wide acceptance of android is the main aspect of grabbing attacker’s interest as it is not having the security measures like computers (Curry, 2023). Every day, the AV-TEST Institute registers over 350,000 new malicious programs and potentially unwanted applications (PUA) (AV-TEST, n.d.). Applications that are developed for convenience of the user also breach their security includes data leakage, password steal without their consent and even user’s access to their own devices can be deprived that can put a user’s privacy at risk. Now a day’s attacks are not limited to certain kind. Innumerous evasion techniques are used by the attackers to get into a device without user’s consent. The latest variant of metamorphic malwares is highly sophisticated and use novel detour techniques.

Android is leading in the operating system providing market because of its open-source operating system, good storage capacity in low cost and easy to use feature. Based on its headfast usage the number of applications is also increasing in the global market. Google play is the biggest application store for the android users with about 2.57 million apps available (Google Play Store Statistics, n.d.). Android applications are also available to download and install from third-party markets. This sometimes end up downloading malicious programs into user’s devices and becomes a reason that android is experiencing more attacks compared to other mobile operating system providers. The compromised devices sometimes bring off some unusual behaviors and the common behaviors observed in an infected device are as follows.

  • Fast Battery drainage because of the background activities performed by malware.

  • Unwanted pop-ups and advertisements appear randomly to trap the user.

  • User receives weird phone calls and texts that may lead to contact with malware.

  • Sometimes unknown apps automatically get installed to the device.

  • Device takes restart automatically, etc.

Several security measures and precautions should be taken care by the user to avoid malware infection. Some of such precautions are listed below.

  • Always use updated software and keep the devices updated with the system updates.

  • Use of unsecure Wi-Fi should be avoided as it can lead to data and information breach.

  • Application from the trusted source should only be used such as Google play. Application installation from other third party should be avoided.

  • User should avoid clicking the suspicious links received in SMS or e-mail.

  • User should make a practice of using strong passwords that is tough to crack.

  • User should not respond or share their information to the junk phone calls.

In addition to the above security measures malware detection is also crucial for keeping hackers out of the computing system and prevents the information from getting compromised. It will also enhance the device’s lifetime by means of its speed and data protection that is a great boon in business prospective. A study of malware behaviors and design of a naive detection model will be able to achieve security objectives in android security space that includes both individual and corporation benefits

Complete Chapter List

Search this Book:
Reset