Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Permission based malware detection analysis in android applications
Download
index.pdf
Date
2014
Author
Pehlivan, Uğur
Metadata
Show full item record
Item Usage Stats
212
views
94
downloads
Cite This
Android mobile devices have developed very fast in past decade and have been very widespread in all over the world. Nowadays, several applications are available on application markets. The number of android applications also increases with the increase in the variety of applications. Those applications may become very dangerous for the users of android mobile devices because of fast development and wide variety of applications. Some applications may have the malicious activities such as novelty and amusement, selling user information and stealing user credentials etc. For this reason, the detection of malicious android applications has become very important in recent years for the security of mobile device’s users. In this study, the permissions required for the installation and running processes of android applications were analyzed to determine best performing feature selection methods and classification algorithms which are used for detecting the malicious applications in android mobile devices. 4 feature selection methods consisted of attribute based and subset based selection methods used to reduce the number of attributes and to increase the performance of classification algorithms. The classification algorithms were chosen from the Bayesian, decision tree and SVM classification algorithms in order to compare the performance of different type of classification algorithms. Moreover, the effect of dataset size was investigated to measure the performance of classification algorithms. The permissions are also analyzed in accordance with their presence in the malicious applications by using the clustering analysis.
Subject Keywords
Androids.
,
Data protection.
,
Computer security.
,
Malware (Computer software).
,
Mobile communication systems.
URI
http://etd.lib.metu.edu.tr/upload/12618000/index.pdf
https://hdl.handle.net/11511/24057
Collections
Graduate School of Informatics, Thesis
Suggestions
OpenMETU
Core
A Software quality model for android applications
Şimşek, Merve Vildan; Betin Can, Aysu; Department of Information Systems (2016)
Nowadays mobile devices have become increasingly widespread. It causes mobile applications number to grow dramatically. As the popularity of these systems is predicted to continue its increase in the near future, the importance of the quality of mobile applications increases. The aim of this study is to present a quality model for Android applications. We chose applications developed for Android Operating System as our target because of its prevalence in the mobile market. To achieve the aim of the study, w...
GUI testing of android applications: a systematic mapping
Aydın, Muzaffer; Betin Can, Aysu; Garousi, Vahid; Department of Information Systems (2014)
Popularity of mobile devices is increasing rapidly all around the world. These devices can be used on various systems which are commonly used by the society. These systems are predicted to overtake desktop platform's popularity in the near future. Therefore the quality of mobile applications has vital importance. High quality applications can only be developed with good testing environments. Considering that multi-featured mobile applications have complex user interfaces, we decided to focus on graphical us...
A Comparative study on automated android application testing tools
Hökelekli, Gülçin; Betin Can, Aysu; Department of Information Systems (2016)
Nowadays, as mobile devices have become widespread, mobile application development has become an area which is considerably popular. This popularity increases the importance of mobile application testing. Distinguishing properties of mobile devices increase the importance of test automation. Thus, the number of mobile test automation tools is growing. Each tool has some advantages and limitations. The aim of this study is to compare the most popular mobile testing tools. We choose Android testing tools beca...
Customer value of mobile services
Zubari, Sinem; Arifoğlu, Ali; Özden, M. Yaşar; Department of Information Systems (2010)
Mobile devices are becoming widely common today. As the number of mobile devices continue to grow all around the world, its functionality is extending and mobile technologies are gaining more popularity in every aspect of our life. Today, wide range of mobile services is offered to people. The purpose of our study is examining the customer value of mobile services for individuals or citizens. A value model for mobile services has been proposed with five dimensions: Functional Value, Social Value, Emotional ...
Comparison of classification algorithms for mobile malware detection: market metadata as input source
Baltacı, Nuray; Baykal, Nazife; Acartürk, Cengiz; Department of Information Systems (2014)
The prevalence of mobile devices has been catching the attention of malware authors especially for Android OS supported devices due to its user-centric security policy and open application development strategy for its official application market. In this study, an automated feature-based static analysis method was applied to detect malicious mobile applications on Android devices. The main purpose of the study is to investigate the contribution of other application market metadata to the detection of malici...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
U. Pehlivan, “Permission based malware detection analysis in android applications,” M.S. - Master of Science, Middle East Technical University, 2014.