Analysis of Android Malware Using Data Replication Features Extracted by Machine Learning Tools

Authors

  • Dr. Chandrashekhar Uppin  Department of Computer Science, Baze University, Abuja, Nigeria
  • Gilbert George  Department of Computer Science, Baze University, Abuja, Nigeria

DOI:

https://doi.org//10.32628/CSEIT195532

Keywords:

Android, Static Malware analysis, Dynamic Malware Analysis, MysteryBot, Ransomware

Abstract

In this era of technology, Smartphone plays a vital role in individual's life. Now-a-days, we tend to use smartphones for storing critical information like banking details, documents etc. as it makes it portable. Android is the most preferred type of operating system for smartphone as per consumer buying interest. But also, vulnerabilities are mainly targeted in case of android by malwares as android is the most vulnerable because of its third-party customization support, which results in identity theft, Denial of Services (DoS), Ransomware attacks etc. In this work, we present android malware called MysteryBot identification, static and dynamic analysis result. MysteryBot is a banking Trojan. Some recommended steps to make your android device safe from such kind of malwares infections are also explained in this paper.

References

  1. S. News, Google play have an obvious growth in 2017, http://tech.sina.com.cn/it/2018-04-05/doc ifysuuya8013472.shtml (Apri 2014).
  2. https://www.mcafee.com/enterprise/en-us/assets/reports/rp-mobile-threat-report-2018.pdf (September, 2018).
  3. Zhang, Y., Ren, W., Zhu, T., & Ren, Y. (2019). SaaS: A situational awareness and analysis system for massive android malware detection. Future Generation Computer Systems.
  4. Schmeelk, S., Yang, J., & Aho, A. (2015, April). Android malware static analysis techniques. In Proceedings of the 10th Annual Cyber and Information Security Research Conference (p. 5). ACM.
  5. Burguera, I., Zurutuza, U., & Nadjm-Tehrani, S. (2011) Crowdroid: behavior-based malware detection system for android. In SPSM’11, Chicago, Illinois, USA, ACM, 2011.
  6. https://www.threatfabric.com/blogs/mysterybot__a_new_android_banking_trojan_ready_for_android_7_and_8.html.
  7. Yu, B., Fang, Y., Yang, Q., Tang, Y., & Liu, L. (2018). A survey of malware behavior description and analysis. Frontiers of Information Technology & Electronic Engineering, 19(5), 583-603.
  8. Zhang, Y., Ren, W., Zhu, T., & Ren, Y. (2019). SaaS: A situational awareness and analysis system for massive android malware detection. Future Generation Computer Systems.
  9. Zhou, Q., Feng, F., Shen, Z., Zhou, R., Hsieh, M. Y., & Li, K. C. (2019). A novel approach for mobile malware classification and detection in Android systems. Multimedia Tools and Applications, 78(3), 3529-3552.
  10. Yen, Y. S., & Sun, H. M. (2019). An Android mutation malware detection based on deep learning using visualization of importance from codes. Microelectronics Reliability, 93, 109-114.
  11. Zhang, L., Thing, V. L., & Cheng, Y. (2019). A scalable and extensible framework for android malware detection and family attribution. Computers & Security, 80, 120-133.
  12. “MysteryBot; a new Android banking Trojan ready for Android 7 and 8 | Blogs ThreatFabric.” Online]. Available: https://www.threatfabric.com/blogs/mysterybot__a_new_android_banking_trojan_ready_for_android_7_and_8.html. Accessed: 23-Sep-2019].
  13. https://santoku-linux.com/about-santoku

Downloads

Published

2019-10-30

Issue

Section

Research Articles

How to Cite

[1]
Dr. Chandrashekhar Uppin, Gilbert George, " Analysis of Android Malware Using Data Replication Features Extracted by Machine Learning Tools, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 5, pp.193-201, September-October-2019. Available at doi : https://doi.org/10.32628/CSEIT195532