Publication: New Results on Permission-Based Static Analysis for Android Malware
| dc.authorscopusid | 56589621700 | |
| dc.authorscopusid | 57190738698 | |
| dc.authorscopusid | 15833929800 | |
| dc.authorscopusid | 22953804000 | |
| dc.contributor.author | Şahin, D.O. | |
| dc.contributor.author | Kural, O.E. | |
| dc.contributor.author | Akleylek, S. | |
| dc.contributor.author | Kilic, E. | |
| dc.date.accessioned | 2020-06-21T13:13:17Z | |
| dc.date.available | 2020-06-21T13:13:17Z | |
| dc.date.issued | 2018 | |
| dc.department | Ondokuz Mayıs Üniversitesi | en_US |
| dc.department-temp | [Şahin] Durmuş Ozkan, Department of Computer Engineering, Ondokuz Mayis Üniversitesi, Samsun, Turkey; [Kural] Oǧuz Emre, Department of Computer Engineering, Ondokuz Mayis Üniversitesi, Samsun, Turkey; [Akleylek] Sedat, Department of Computer Engineering, Ondokuz Mayis Üniversitesi, Samsun, Turkey; [Kilic] Erdal, Department of Computer Engineering, Ondokuz Mayis Üniversitesi, Samsun, Turkey | en_US |
| dc.description | IEEE Society | en_US |
| dc.description.abstract | Mobile devices' hardware have been enhancing day by day. With this development, mobile phones are supporting many programs and everyone takes advantage of them. Nevertheless, malware applications are increasing more and more so that people can come across lots of problems. Android is a mobile operating system that is the most used on the smart mobile phones. Because it is the most used and open source, it has been the target of attackers. Android security related to the permissions allowed by users to the applications. There have been many studies on the permission based Android malware detection. In this study, permission based Android malware system is analyzed. Unlike other studies, we propose permission weight approach. Each of permissions is given a different score by means of this approach. Then, K-nearest Neighbor (KNN) and Naïve Bayes (NB) algorithms are applied and the proposed method is compared with the previous studies. According to the experimental results, the proposed approach has better results than the other ones. © 2018 IEEE. | en_US |
| dc.identifier.doi | 10.1109/ISDFS.2018.8355377 | |
| dc.identifier.endpage | 4 | en_US |
| dc.identifier.isbn | 9781538634493 | |
| dc.identifier.scopus | 2-s2.0-85050984082 | |
| dc.identifier.startpage | 1 | en_US |
| dc.identifier.uri | https://doi.org/10.1109/ISDFS.2018.8355377 | |
| dc.identifier.wos | WOS:000434247400064 | |
| dc.language.iso | en | en_US |
| dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
| dc.relation.ispartof | -- 6th International Symposium on Digital Forensic and Security, ISDFS 2018 -- 2018-03-22 through 2018-03-25 -- Antalya -- 136277 | en_US |
| dc.relation.journal | 2018 6Th International Symposium on Digital Forensic and Security (Isdfs) | en_US |
| dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
| dc.rights | info:eu-repo/semantics/closedAccess | en_US |
| dc.subject | Android Malware | en_US |
| dc.subject | Malware Classification | en_US |
| dc.subject | Mobile Security | en_US |
| dc.subject | Static Analysis | en_US |
| dc.title | New Results on Permission-Based Static Analysis for Android Malware | en_US |
| dc.type | Conference Object | en_US |
| dspace.entity.type | Publication |
