Permission Request Pattern Recognition in Android Malware Applications

Permission Request Pattern Recognition in Android Malware Applications

Ahmed Ben Ayed
Copyright: © 2017 |Volume: 8 |Issue: 1 |Pages: 13
ISSN: 1947-3095|EISSN: 1947-3109|EISBN13: 9781522513971|DOI: 10.4018/IJSITA.2017010103
Cite Article Cite Article

MLA

Ben Ayed, Ahmed. "Permission Request Pattern Recognition in Android Malware Applications." IJSITA vol.8, no.1 2017: pp.37-49. http://doi.org/10.4018/IJSITA.2017010103

APA

Ben Ayed, A. (2017). Permission Request Pattern Recognition in Android Malware Applications. International Journal of Strategic Information Technology and Applications (IJSITA), 8(1), 37-49. http://doi.org/10.4018/IJSITA.2017010103

Chicago

Ben Ayed, Ahmed. "Permission Request Pattern Recognition in Android Malware Applications," International Journal of Strategic Information Technology and Applications (IJSITA) 8, no.1: 37-49. http://doi.org/10.4018/IJSITA.2017010103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This article discusses that smartphone systems have known a huge evolution in terms of their capacities and functionalities. Therefore, they are used extensively for professional and personal work. Since smartphones became popular, cybercriminals and Malware developers have shown an extensive interest in the smartphone's system. Therefore, the protection of these devices is very important. Since Malware has to be granted some permissions to achieve its goals, the author believes those permissions could be a useful characteristic in helping detect malicious applications. However, the usefulness of such features is not yet confirmed. This research consists of an examination of three hundred eighty-seven different Android-Based Malware applications in order to determine if there is a permission request pattern. This article presents a complete analysis of permission requests in Android malicious applications using the Self-Organizing Maps.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.