Abstract
In recent years, the global pervasiveness of smartphones has prompted the development of millions of free and commercially available applications. These applications allow users to perform various activities, such as communicating, gaming, and completing financial and educational tasks. These commonly used devices often store sensitive private information and, consequently, have been increasingly targeted by harmful malicious software. This paper focuses on the concepts and risks associated with malware, and reviews current approaches and mechanisms used to detect malware with respect to their methodology, associated datasets, and evaluation metrics.
Highlights
I N the last decade, the use of smartphones has accelerated globally
In light of the above, this paper aims to provide a comprehensive survey of recent studies published since 2010, covering essential feature extraction analysis: static, dynamic, and hybrid methods
They utilized Transmission Control Protocol (TCP) packets and tShark 3 and extracted 11 features, which are: source/destination IP address, source/destination host port number, frame length and number, http protocol used to submit data from client to server, number of frames received by unique source/destination in the last T seconds from the same source, number of packets flowing from source to destination, and vice versa
Summary
I N the last decade, the use of smartphones has accelerated globally. Smartphones support a wide range of tasks, such as taking photographs, recording videos, texting, and performing financial transactions. Smartphones can support gaming, networking, and educational tasks. In terms of units shipped and usage, smartphones outstrip both desktop and tablet computers [1], [2]. Statistics [9] show that in 2019 there were more than 3.5 million malware installation packages, including worms, trojans, and adware. Defending against such malware is an important undertaking, and methods and techniques to detect and prevent malware infections of mobile devices have attracted increasing attention in both academic and industrial fields.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.