Abstract
The spread of digital crimes have increased with the expansion in the use of smartphones. Especially, the major security threats have been seen in the case of android devices as android is the most famous working framework among smart phones. As these gadgets store confidential data of clients like private information, monetary data, thus malwares are being produced for stealing data. The reason behind why android OS is progressively prone toward malware assaults is that it does not put restrictions on its clients to download from unreliable sites. For understanding the risks to the Android clients’ data, it is relevant to comprehend the distinction in the conduct of genuine and pernicious applications and study mobile malware detection. There are various methodologies for these Intrusions’ identification, for example, static investigation, dynamic investigation and hybrid investigation which have been covered in this paper along with their functionalities. The benefits and constraints of each classification of android malware detection systems are also discussed. Therefore, this paper fundamentally focuses on the comparative study of these techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Singh PK, Kar AK, Singh Y, Kolekar MH, Tanwar S. Recent innovations in computing, vol 597. Springer, Switzerland. ISBN: 978-3-030-29406-9
Shabtai A, Tenenboim-chekina L, Mimran D, Rokach L, Shapira B, Elo-vici Y (2014) Mobile malware detection through analysis of deviations in application network behavior. In: Digital investigation. Elsevier
Grace M, Zhou Y, Zhang Q, Zou S, Jiang X (2012) RiskRanker: scalable and accurate zero-day android malware detection. In: Proceedings of the 10th international conference on mobile systems, applications, and services (MobiSys ’12), ACM, pp 281–294
Kolbitsch C, Comparetti PM, Kruegel C, Kirda E, Zhou XY, Wang X (2009) Effective and efficient malware detection at the end host. In: USENIX security symposium, pp 351–366
Sayfullina L, Eirola E, Komashinsky D, Palumbo P, Miche Y, Lendasse A, Karhunen J (2015) Efficient detection of zero-day Android malware using normalized bernoulli naive bayes. In: 2015 IEEE Trustcom/BigDataSE/ISPA, pp 198–205
Shen T, Zhongyang Y, Xin Z, Mao B, Huang H (2014) Detect android malware variants using component based topology graph. In: 2014 IEEE 13th international conference on trust, security and privacy in computing and communications, pp 406–413
Enck W, Gilbert P, Chun BG (2008) TaintDroid: an information-flow tracking system for real-time privacy monitoring on smartphones. In: 9th USENIX symposium on operating systems design and implementation, pp 393–407
Zheng M, Sun M, Lui JC (2014) DroidTrace: a ptrace based android dynamic analysis system with forward execution capability. In: Wireless communications and mobile computing conference (IWCMC), pp 128–133
Li J, Zhai L, Zhang X, Quan D (2014) Research of android malware detection based on network traffic monitoring. In: Industrial electronics and applications (ICIEA), pp 1739–1744
Feizollah A, Anuar NB, Salleh R, Suarez-Tangil G, Furnell S (2017) Androdialysis: analysis of android intent effectiveness in malware detection. Comput Secur 65:121–134. https://www.sciencedirect.com/science/article/pii/S016740481630160
Schmidt AD, Schmidt HG, Clausen J, Yuksel KA, Kiraz O, Camtepe A, Albayrak S (2008) Enhancing security of Linux-based android devices. In: Proceedings of 15th international Linux Kongress, pp 1–16
Aneja L, Babbar S (2019) Malware detection in android devices using system calls under dynamic analysis. IJIET 13(3)
Aneja L, Babbar S (2017) Research trends in malware detection on android devices. Springer
Malik S, Khatter K (2016) System call analysis of android malware families. Indian J Sci Technol (IJST) 9(21)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Aneja, L., Singh, J. (2021). Comparative Study of Various Intrusion Detection Techniques for Android Malwares. In: Singh, P.K., Wierzchoń, S.T., Tanwar, S., Ganzha, M., Rodrigues, J.J.P.C. (eds) Proceedings of Second International Conference on Computing, Communications, and Cyber-Security. Lecture Notes in Networks and Systems, vol 203. Springer, Singapore. https://doi.org/10.1007/978-981-16-0733-2_64
Download citation
DOI: https://doi.org/10.1007/978-981-16-0733-2_64
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-0732-5
Online ISBN: 978-981-16-0733-2
eBook Packages: EngineeringEngineering (R0)