Skip to main content

Comparative Study of Various Intrusion Detection Techniques for Android Malwares

  • Conference paper
  • First Online:
Proceedings of Second International Conference on Computing, Communications, and Cyber-Security

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 203))

  • 1800 Accesses

Abstract

The spread of digital crimes have increased with the expansion in the use of smartphones. Especially, the major security threats have been seen in the case of android devices as android is the most famous working framework among smart phones. As these gadgets store confidential data of clients like private information, monetary data, thus malwares are being produced for stealing data. The reason behind why android OS is progressively prone toward malware assaults is that it does not put restrictions on its clients to download from unreliable sites. For understanding the risks to the Android clients’ data, it is relevant to comprehend the distinction in the conduct of genuine and pernicious applications and study mobile malware detection. There are various methodologies for these Intrusions’ identification, for example, static investigation, dynamic investigation and hybrid investigation which have been covered in this paper along with their functionalities. The benefits and constraints of each classification of android malware detection systems are also discussed. Therefore, this paper fundamentally focuses on the comparative study of these techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Singh PK, Kar AK, Singh Y, Kolekar MH, Tanwar S. Recent innovations in computing, vol 597. Springer, Switzerland. ISBN: 978-3-030-29406-9

    Google Scholar 

  2. Shabtai A, Tenenboim-chekina L, Mimran D, Rokach L, Shapira B, Elo-vici Y (2014) Mobile malware detection through analysis of deviations in application network behavior. In: Digital investigation. Elsevier

    Google Scholar 

  3. Grace M, Zhou Y, Zhang Q, Zou S, Jiang X (2012) RiskRanker: scalable and accurate zero-day android malware detection. In: Proceedings of the 10th international conference on mobile systems, applications, and services (MobiSys ’12), ACM, pp 281–294

    Google Scholar 

  4. Kolbitsch C, Comparetti PM, Kruegel C, Kirda E, Zhou XY, Wang X (2009) Effective and efficient malware detection at the end host. In: USENIX security symposium, pp 351–366

    Google Scholar 

  5. Sayfullina L, Eirola E, Komashinsky D, Palumbo P, Miche Y, Lendasse A, Karhunen J (2015) Efficient detection of zero-day Android malware using normalized bernoulli naive bayes. In: 2015 IEEE Trustcom/BigDataSE/ISPA, pp 198–205

    Google Scholar 

  6. Shen T, Zhongyang Y, Xin Z, Mao B, Huang H (2014) Detect android malware variants using component based topology graph. In: 2014 IEEE 13th international conference on trust, security and privacy in computing and communications, pp 406–413

    Google Scholar 

  7. Enck W, Gilbert P, Chun BG (2008) TaintDroid: an information-flow tracking system for real-time privacy monitoring on smartphones. In: 9th USENIX symposium on operating systems design and implementation, pp 393–407

    Google Scholar 

  8. Zheng M, Sun M, Lui JC (2014) DroidTrace: a ptrace based android dynamic analysis system with forward execution capability. In: Wireless communications and mobile computing conference (IWCMC), pp 128–133

    Google Scholar 

  9. Li J, Zhai L, Zhang X, Quan D (2014) Research of android malware detection based on network traffic monitoring. In: Industrial electronics and applications (ICIEA), pp 1739–1744

    Google Scholar 

  10. Feizollah A, Anuar NB, Salleh R, Suarez-Tangil G, Furnell S (2017) Androdialysis: analysis of android intent effectiveness in malware detection. Comput Secur 65:121–134. https://www.sciencedirect.com/science/article/pii/S016740481630160

  11. Schmidt AD, Schmidt HG, Clausen J, Yuksel KA, Kiraz O, Camtepe A, Albayrak S (2008) Enhancing security of Linux-based android devices. In: Proceedings of 15th international Linux Kongress, pp 1–16

    Google Scholar 

  12. Aneja L, Babbar S (2019) Malware detection in android devices using system calls under dynamic analysis. IJIET 13(3)

    Google Scholar 

  13. Aneja L, Babbar S (2017) Research trends in malware detection on android devices. Springer

    Google Scholar 

  14. Malik S, Khatter K (2016) System call analysis of android malware families. Indian J Sci Technol (IJST) 9(21)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Aneja, L., Singh, J. (2021). Comparative Study of Various Intrusion Detection Techniques for Android Malwares. In: Singh, P.K., Wierzchoń, S.T., Tanwar, S., Ganzha, M., Rodrigues, J.J.P.C. (eds) Proceedings of Second International Conference on Computing, Communications, and Cyber-Security. Lecture Notes in Networks and Systems, vol 203. Springer, Singapore. https://doi.org/10.1007/978-981-16-0733-2_64

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-0733-2_64

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-0732-5

  • Online ISBN: 978-981-16-0733-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics