Categories: android

Exploring the Malicious Android Applications

Exploring the Malicious Android Applications

Android plays a vital role in the today’s market. According to recent survey placed nearly 84.4% of people stick to android which explosively become popular for personal or business purposes. It is no doubt that the application are extremely familiar in the market for their amazing features and the wonderful benefits of android applications makes the users to fall for it. Android imparts significant responsibility to application developers for designing the application with understanding the risk of security issues. When concerned about security, malware protection is a major issue in which android has been a major target of malicious applications .In android based applications, permission control is one of the major security mechanisms. In this project, the permission induced risk in application, and the fundamentals of the android security architecture are explored, and it also focuses on the security ranking algorithms that are unique to specific applications. Hence, we propose the system providing the detection of malware analysis based on permission and steps to mitigate from accessing unwanted permission (limits the permission). It is also designed to reduce the probability of vulnerable attacks. Codeshoppy

The growth of mobile phone technology has revolutionized the whole world. As the number of users is increasing day by day, facilities are also increasing [16]. The increase in the usage of phone had made a drastic change in environment. [17]. Now mobiles are not used just for making calls, but instead they have innumerable uses as a Camera, Music player, Tablet PC, TV, and Web browser, Android operating system (OS) is mainly introduced with lot of advancement and its diverged features to make human life easier. The most widely used mobile OS on these days is Android [17] which plays a vital role in today’s market. The detection of the malicious application (malapps) out of the application (app) markets is an ongoing challenge. One of the key points of Android security mechanisms is permission control that restricts the access of applications (apps) to core facilities of devices [1]. Android forces apps to declare the permissions they require when they install them. The users can guard our privacy and security, by paying attention to android app permissions when installing those apps, where many users unaware about the permissions. The app declares its permissions when it is installed. In general, these permissions access cannot be controlled. The app displays what the requirements are and whether we need to accept or reject it. Permissions are abundant in the model. The problem is that most android users have no idea about the proper installation of an app. Many users, failed to read the[EULA] End User License Agreement in which think its a matter to quickly tap through when installing apps [9]. To protect against malware the android platform presents an application environment that ensuring the security to users and all developers. Hence, to securing an open platform the system is designed with these robust security architectures and rigorous security programs

On a recent survey [17], as reported on Wikipedia, the Google play store has nearly 1billion application where the increase in usage of android apps increases day by day. The android is open source were the people getting moved to the application. The android operating system and its apps play a vital role in the today’s world .So the focal target is towards attacking them. The threat has caused great rise in the malware1, chargeware2, and adware3 [7]. So, various analyses and research have been made to find better results on the malware detection and new technique involving the higher detection rate and accuracy. The main issue is when concerned with android its security, apparently the main cause is the malware. Earlier the malware detection was through a system call request in which based on only on request, where internal behavior is not analyzed. In terms of static it is based on privilege escalation attacks detection and prevention of attacks [14]. It includes various methodologies comprising the Component-based permission escalation, Application-level privilege escalation attack. In another work, a framework for segregation of software in android platform with application of security [8].MOSES represented as MOde-of-uses SEparation in Smartphones, where the android level semantics filtrations of irrelevant behaviors are done.

https://codeshoppy.com/android-app-ideas-for-students-college-project.html
Writer

Recent Posts

predict the price of the house machine learning

predict the price of the house machine learning In today's fast-paced world, the real estate market is constantly evolving, making…

5 months ago

Ecommerce Fake Product Reviews Monitor and Deletion System

Ecommerce Fake Product Reviews Monitor and Deletion System Introducing the Ecommerce Fake Product Reviews Monitor and Deletion System In the…

5 months ago

Hate speech detection using machine learning

Hate speech detection using machine learning Hate speech is a growing concern in our digital age, posing a serious threat…

5 months ago

AI Mental Health Therapist Chatbot sysem application

AI Mental Health Therapist Chatbot sysem application AI Mental Health Therapist Chatbot: Revolutionizing Mental Health Support In today's fast-paced and…

5 months ago

What are information about Data Science Python Beginner Level Project

What are information about Data Science Python Beginner Level Project Data Science Python Beginner Level Project: Everything You Need to…

5 months ago

College Campus Grievance based on Django Applicaiton

College Campus Grievance based on Django Applicaiton Title: Resolving College Campus Grievances with a Django Application Introduction: In today's interconnected…

5 months ago