MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "d959cfd3-ca11-4325-9676-ee9391c9408d"}, "_deposit": {"id": "4297", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4297"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4297", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Permission-Based Anomalous Application Detection on Android Smart Phone", "subitem_1551255648112": "en_US"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Information applications are widely used by millions of users to perform manydifferent activities. Android-based smart phone users can get free applications fromAndroid Application Market. But, these applications were not certified by legitimateorganizations and they may contain malware applications that can steal privateinformation from users.The proposed system develops a permission-based malware detection toprotect the privacy of android smart phone users. This system monitors variouspermissions obtained from android applications and analyses them by using astatistical technique called Singular Value Decomposition (SVD) to estimate thecorrelations of permissions. The dataset including approximately 4000 malware JSONfiles are downloaded from https://www.kaggle.com/goorax/static-analysis-of-androidmalware-of-2017. The training phase emphasizes on the malware samples(approximately 300) which includes the most significant patterns of the currentmalware environment according to the analysis results. The testing phase is conductedon 120 malware and goodware apps.The proposed system evaluates the risk level (High, Medium, and Low) ofAndroid applications based on the correlation patterns of permissions. The overallaccuracy of the system is 85% for malware applications and goodware applications asthe test results."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-09-23"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Permission-Based Anomalous Application Detection on Android Smart Phone.pdf", "filesize": [{"value": "949 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 949000.0, "url": {"url": "https://meral.edu.mm/record/4297/files/Permission-Based Anomalous Application Detection on Android Smart Phone.pdf"}, "version_id": "6c56206d-dfbb-4dd8-ad01-87997c9b9092"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "University of Computer Studies, Yangon", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Win, Htet Htet"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Thesis"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2019-01"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/2238"}, "item_title": "Permission-Based Anomalous Application Detection on Android Smart Phone", "item_type_id": "21", "owner": "1", "path": ["1597824322519"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004297", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-09-23"}, "publish_date": "2019-09-23", "publish_status": "0", "recid": "4297", "relation": {}, "relation_version_is_last": true, "title": ["Permission-Based Anomalous Application Detection on Android Smart Phone"], "weko_shared_id": -1}
Permission-Based Anomalous Application Detection on Android Smart Phone
http://hdl.handle.net/20.500.12678/0000004297
http://hdl.handle.net/20.500.12678/0000004297210d137f-b772-447a-8d95-3354852d8c78
d959cfd3-ca11-4325-9676-ee9391c9408d
Name / File | License | Actions |
---|---|---|
Permission-Based Anomalous Application Detection on Android Smart Phone.pdf (949 Kb)
|
|