Research on Smartphone Application Malicious Behavior Evaluation Using Fuzzy Analytical Hierarchy Process

Article Preview

Abstract:

Due to the highly developed modern technology,Smart phones and other mobile devices are become more and more universal. Most of those devices are used to process or store sensitive and confidential data.Consequently,it may cause many problems,such as privacy disclosure,mobile phone virus,spyware,etc. In order to solve those issues,We need a smart phone security evaluation system to evaluate malicious applications.In this paper we starting from classifying the effects of attack caused by all kinds of malicious mobile applications and analyzed malicious code database.according to the consequence those applications have made, we pointed that a smartphone application`s malicious behaviour can be divided into five classifications.and based on this classification,we proposed a smartphone application security evaluation system and by using Fuzzy Analytical Hierarchy Process to determine the security target weight.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

5733-5736

Citation:

Online since:

September 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] JBurguera I, Zurutuza U: behavior-based malware detection system for android[C]/1st ACM workshop on Security and privacy in smartphones and mobile devices. ACM, 2011: 15-26.

DOI: 10.1145/2046614.2046619

Google Scholar

[2] Peng S, Yu S, Yang A. Smartphone Malware and Its Propagation Modeling: A Survey[J]. (2013).

Google Scholar

[3] Zhang J J. Fuzzy analytical hierarchy process[J]. Fuzzy Systems and Mathematics, (2000).

Google Scholar

[4] Asokan N: Mobile Platform Security[M]. Morgan & Claypool Publishers, (2013).

Google Scholar

[5] Min L X: Runtime-based Behavior Dynamic Analysis System for Android Malware Detection[J]. Advanced Materials Research, (2013).

DOI: 10.4028/www.scientific.net/amr.756-759.2220

Google Scholar

[6] Zarch S H M, Jalilzadeh F: Data Mining For Intrusion Detection in Mobile Systems[J]. IOSR Journal of Computer Engineering, (2012).

Google Scholar

[7] Si-Cong G. Method of structuring element in fuzzy analysis [J]. Journal of Liaoning Technical University, 2002, 6.

Google Scholar