Analysis of Permissions Correlation for Android Apps Using Statistical SVD Approach

Authors

  • Zon Nyein Nway University of Computer Studies, Yangon
  • Htet Htet Win University of Computer Studies, Yangon, Myanmar

DOI:

https://doi.org/10.14738/tnc.82.8181

Keywords:

Android, Permissions, Apps (applications), SVD (Singular Value Decomposition), Risk level, Malware, Goodware

Abstract

Nowadays, almost all the users use Android applications in their smart phones for various reasons Since Android is free operating system, android-apps can be easily downloaded via biggest open app stores and third-party mobile app markets. But these applications were not guaranteed whether these are malware apps or not by legitimate organizations. As mobile phones are glued with most of the people, malware applications threaten all of them for their private information. So, the work of analysis for the apps is very important. The proposed system analyzes the correlation patterns of app’s permissions that must be used in all android apps by developers by using a statistical technique called singular value decomposition (SVD). The analysis phase uses the numbers of malware samples 50 to 300 from https://www.kaggle.com/goorax/static-analysis-of-android-malware-of-2017. The proposed system evaluates the risk level (High, Medium, and Low) of Android applications based on the correlation patterns of permissions. The system accuracy is 85% for both malware and goodware applications.

Nowadays, almost all the users use Android applications in their smart phones for various reasons Since Android is free operating system, android-apps can be easily downloaded via biggest open app stores and third-party mobile app markets. But these applications were not guaranteed whether these are malware apps or not by legitimate organizations. As mobile phones are glued with most of the people, malware applications threaten all of them for their private information. So, the work of analysis for the apps is very important. The proposed system analyzes the correlation patterns of app’s permissions that must be used in all android apps by developers by using a statistical technique called singular value decomposition (SVD). The analysis phase uses the numbers of malware samples 50 to 300 from https://www.kaggle.com/goorax/static-analysis-of-android-malware-of-2017. The proposed system evaluates the risk level (High, Medium, and Low) of Android applications based on the correlation patterns of permissions. The system accuracy is 85% for both malware and goodware applications.

References

(1) “Significant Permission Identification for Machine Learning Based Android Malware Detection”, L. Jin, S. Lichao, Y. Qiben, L. Zhiqiang, S.A. Witawas, Y. Heng, 2017.

(2) “Effective Permission Analysis and Complete Security for Android Application”, G.N. Bharathi, T. Anusha, R.S. MeenaKumari, P. Aprna.

(3) “Permission-Based Android Malware Detection”, Zarni Aung, Win Zaw, March 2013.

(4) “Anomalous Android Application Detection with Latent Semantic Indexing”, H. Shahriar, V. Vlincy, 2016 IEEE

th Annual Computer Software and Applications Conference.

(5) “Ethical hacking and counter measures by EC-Council”.

(6) “Spam SMS Detection on Android Smart Phone”, Hay Mar Sam, July 2015.

(7) “Information Retrieval for Pharmacy using location – Based Mobile System”, Myat Su Aung, December 2016.

(8) “Stock Trend Prediction from Mobile Device Through Web Services”, Kay Thi Aung, December 2015.

(9) “SMS Security with Aes Algorithm on Android OS”, Phyo Su Khin, February 2017.

(10) “Analyzing Terror Attacks using Latent Semantic Indexing”, I. Toure, A. Gangopadjyay, 2013 IEEE.

(11) “A Survey of Android Malware Characteristics and Mitigation Techniques”, V. Cooper, H. Shahriar, and H. Haddad, Proc. Of the 11th International Conference on Information Technology: New Generations, IEEE CPS, Las Vegas, USA, April 2014, pp.327-332.

(12) “Using Latent Semantic Analysis to Identify Similarities in Source Code to Support Program Understanding”, A. Marcus and J. Maletic, Proc. Of 12th IEEE International Conference on Tools with Artificial Intelligence, November 2000, pp. 46-53.

(13) “Effective Permission Analysis and Complete Security for Android Application”, G.N.Bharathi, SSRG International Journal of Computer Science and Engineering – (ICCREST’17) – Special Issue – March 2017, ISSN: 2348 - 8387.

(14) Foracchia, M., Extraction and quantitative description of vessel features in hypertensive retinopathy fundus images, in Book Abstracts 2nd Int. Workshop on Computer Assisted Fundus Image Analysis, E. Grisan, Editor

p. 6-6.

(15) Xiaohong, G., et al. A method of vessel tracking for vessel diameter measurement on retinal images. in Image Processing, 2001. Proceedings. 2001 International Conference on.

(16) Lowell, J., et al., Measurement of retinal vessel widths from fundus images based on 2-D modeling. Medical Imaging, IEEE Transactions on, 2004. 23(10): p. 1196-1204.

(17) Hong, S., et al., Optimal scheduling of tracing computations for real-time vascular landmark extraction from retinal fundus images. Information Technology in Biomedicine, IEEE Transactions on, 2001. 5(1): p. 77-91.

(18) Pinz, A., et al., Mapping the human retina. Medical Imaging, IEEE Transactions on, 1998. 17(4): p. 606-619.

(19) Zana, F. and J.C. Klein, A multimodal registration algorithm of eye fundus images using vessels detection and Hough transform. Medical Imaging, IEEE Transactions on, 1999. 18(5): p. 419-428.

(20) Can, A., et al., A Feature-Based, Robust, Hierarchical Algorithm for Registering Pairs of Images of the Curved Human Retina. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2002. 24: p. 347-364.

(21) Fritzsche, K., et al., Automated Model Based Segmentation, Tracing and Analysis of Retinal Vasculature from Digital Fundus Images, in State-of-The-Art Angiography, Applications and Plaque Imaging Using MR, CT, Ultrasound and X-rays2003, Academic Press. p. 225-298.

(22) Hoover, A. and M. Goldbaum, Locating the optic nerve in a retinal image using the fuzzy convergence of the blood vessels. Medical Imaging, IEEE Transactions on, 2003. 22(8): p. 951-958.

(23) Foracchia, M., E. Grisan, and A. Ruggeri, Detection of optic disc in retinal images by means of a geometrical model of vessel structure. Medical Imaging, IEEE Transactions on, 2004. 23(10): p. 1189-1195.

(24) Huiqi, L. and O. Chutatape, Automated feature extraction in color retinal images by a model based approach. Biomedical Engineering, IEEE Transactions on, 2004. 51(2): p. 246-254.

(25) Fritzsche, K.H., Computer vision algorithms for retinal vessel detection and width change detection, 2004, Rensselaer Polytechnic Institute: Troy, NY, USA.

(26) Houben, A.J.H.M., et al., Quantitative analysis of retinal vascular changes in essential and renovascular hypertension. Journal of hypertension, 1995. 13(12).

(27) Wasan, B., et al., Vascular network changes in the retina with age and hypertension. Journal of hypertension, 1995. 13(12).

(28)Koozekanani, D., et al., Tracking the Optic Nerve Head in OCT Video Using Dual Eigenspaces and an Adaptive Vascular Distribution Model. Computer Vision and Pattern Recognition, IEEE Computer Society Conference on, 2001. 1: p. 934.

Downloads

Published

2020-06-11

How to Cite

Nway, Z. N., & Win, H. H. . (2020). Analysis of Permissions Correlation for Android Apps Using Statistical SVD Approach. Discoveries in Agriculture and Food Sciences, 8(2), 10–19. https://doi.org/10.14738/tnc.82.8181