Abstract
Over the last few years, the presence of mobile devices in our lives has increased, offering us almost the same functionality as personal computers. Since the arrival of Android devices, the amount of applications available for this operating system has increased exponentially. Android has become one of the most popular operating systems in these devices. In fact, malware writers insert malicious applications into Android using the Play store and other alternative markets. Lately, many new approaches have been made. Sanz et al., for instance, presented PUMA, a method used to detect malicious apps just by taking a look at the permissions. In this paper, we present the differences between that interesting approach and a newer and bigger dataset. Besides, we also present an evolution in the permissions along the years.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
- 2.
- 3.
- 4.
- 5.
- 6.
- 7.
- 8.
Adware is a type of action hidden in applications, which send targeted advertisements to our device when you run an application.
- 9.
References
Schultz, M.G., Eskin, E., Zadok, E., Stolfo, S.J.: Data mining methods for detection of new malicious executables. In: Proceedings of 2001 IEEE Symposium on Security and Privacy, S&P 2001, pp. 38–49. IEEE (2001)
Rieck, K., Holz, T., Willems, C., Düssel, P., Laskov, P.: Learning and classification of malware behavior. In: Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, pp. 108–125 (2008)
Tian, R., Batten, L., Islam, M., Versteeg, S.: An automated classification system based on the strings of trojan and virus families. In: 2009 4th International Conference on Malicious and Unwanted Software (MALWARE), pp. 23–30. IEEE (2009)
Sanz, B., Santos, I., Laorden, C., Ugarte-Pedrero, X., Bringas, P.G., Álvarez, G.: Puma: permission usage to detect malware in android. In: International Joint Conference CISIS’12-ICEUTE’ 12-SOCO’ 12 Special Sessions, pp. 289–298. Springer (2013)
Arp, D., Spreitzenbarth, M., Hübner, M., Gascon, H., Rieck, K., Siemens, C.: Drebin: effective and explainable detection of android malware in your pocket. In: Proceedings of NDSS (2014)
Bishop, C.M., et al.: Pattern Recognition and Machine Learning, vol. 4. Springer, New York (2006)
Kohavi, R., et al.: A study of cross-validation and bootstrap for accuracy estimation and model selection. IJCAI 14, 1137–1145 (1995)
Singh, Y., Kaur, A., Malhotra, R.: Comparative analysis of regression and machine learning methods for predicting fault proneness models. Int. J. Comput. Appl. Technol. 35(2009), 183–193 (2009)
Breiman, L.: Random forests. Mach. Learn. 45, 5–32 (2001). doi:10.1023/A:1010933404324
Quinlan, J.: C4. 5: Programs for Machine Learning. Morgan kaufmann (1993)
Salzberg, S.L.: C4.5: programs for machine learning by J. Ross Quinlan. Morgan Kaufmann Publishers, inc., 1993. Mach. Learn. 16, 235–240 (1994). doi:10.1007/BF00993309
Jiang, L., Wang, D., Cai, Z., Yan, X.: Survey of improving naive bayes for classification. In: Alhajj, R., Gao, H., Li, X., Li, J., Zaïane, O. (eds.) Advanced Data Mining and Applications. Lecture Notes in Computer Science, Vol. 4632, pp. 134–145. Springer, Berlin/Heidelberg (2007)doi:10.1007/978-3-540-73871-8_14
Platt, J.C.: Sequential minimal optimization: a fast algorithm for training support vector machines (1998)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
de la Puerta, J., Sanz, B., Santos Grueiro, I., Bringas, P.G. (2015). The Evolution of Permission as Feature for Android Malware Detection. In: Herrero, Á., Baruque, B., Sedano, J., Quintián, H., Corchado, E. (eds) International Joint Conference. CISIS 2015. Advances in Intelligent Systems and Computing, vol 369. Springer, Cham. https://doi.org/10.1007/978-3-319-19713-5_33
Download citation
DOI: https://doi.org/10.1007/978-3-319-19713-5_33
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-19712-8
Online ISBN: 978-3-319-19713-5
eBook Packages: EngineeringEngineering (R0)