Android Botnets
Open Access
- 1 July 2020
- journal article
- research article
- Published by IGI Global in Journal of Organizational and End User Computing
- Vol. 32 (3), 50-67
- https://doi.org/10.4018/joeuc.2020070105
Abstract
Mobile botnets are gaining popularity with the expressive demand of smartphone technologies. Similarly, the majority of mobile botnets are built on a popular open source OS, e.g., Android. A mobile botnet is a network of interconnected smartphone devices intended to expand malicious activities, for example; spam generation, remote access, information theft, etc., on a wide scale. To avoid this growing hazard, various approaches are proposed to detect, highlight and mark mobile malware applications using either static or dynamic analysis. However, few approaches in the literature are discussing mobile botnet in particular. In this article, the authors have proposed a hybrid analysis framework combining static and dynamic analysis as a proof of concept, to highlight and confirm botnet phenomena in Android-based mobile applications. The validation results affirm that machine learning approaches can classify the hybrid analysis model with high accuracy rate (98%) than classifying static or dynamic individually. Request access from your librarian to read this article's full text.Keywords
This publication has 16 references indexed in Scilit:
- Computational offloading mechanism for native and android runtime based mobile applicationsJournal of Systems and Software, 2016
- SMARTbot: A Behavioral Analysis Framework Augmented with Machine Learning to Identify Mobile Botnet ApplicationsPLOS ONE, 2016
- Android Botnets: What URLs are Telling UsPublished by Springer Science and Business Media LLC ,2015
- DeDroid: A Mobile Botnet Detection Approach Based on Static AnalysisPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- Fresh apps: an empirical study of frequently-updated mobile apps in the Google play storeEmpirical Software Engineering, 2015
- A measurement study of google playPublished by Association for Computing Machinery (ACM) ,2014
- Permission-combination-based scheme for Android mobile malware detectionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- Rage against the virtual machinePublished by Association for Computing Machinery (ACM) ,2014
- Droid permission miner: Mining prominent permissions for Android malware analysisPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- Detection of Mobile Botnet Using VPNPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013