MOBSAFE: ANALYSIS OF ANDROID MOBILE APPLICATIONS USING CLOUD COMPUTING AND DATA MINING



Similar documents
International Journal of Advance Research in Computer Science and Management Studies

Protecting the Infrastructure: Symantec Web Gateway

How Attackers are Targeting Your Mobile Devices. Wade Williamson

DESKTOP BASED RECOMMENDATION SYSTEM FOR CAMPUS RECRUITMENT USING MAHOUT

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN:

WildFire Overview. WildFire Administrator s Guide 1. Copyright Palo Alto Networks

Introduction to Big data. Why Big data? Case Studies. Introduction to Hadoop. Understanding Features of Hadoop. Hadoop Architecture.

Fast remote data access for control of TCP/IP network using android Mobile device

Distributed Framework for Data Mining As a Service on Private Cloud

Linux A first-class citizen in Windows Azure. Bruno Terkaly bterkaly@microsoft.com Principal Software Engineer Mobile/Cloud/Startup/Enterprise

WildFire Cloud File Analysis

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

Smartphone Pentest Framework v0.1. User Guide

Operationalise Predictive Analytics

AN ANDROID APPLICATION FOR ISSUING AND VERIFYING COMMUTER TRAIN TICKET THROUGH GPS USING CLOUD

Remote Android Assistant with Global Positioning System Tracking

WildFire. Preparing for Modern Network Attacks

Analyzing HTTP/HTTPS Traffic Logs

Analysis of advanced issues in mobile security in android operating system

DoS: Attack and Defense

Unified Security, ATP and more

WEBAPP PATTERN FOR APACHE TOMCAT - USER GUIDE

How To Make A Secure Storage On A Mobile Device Secure

Page 1. Lecture 1: Introduction to. Introduction to Computer Networks Security. Input file DES DES DES DES. Output file

(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation

ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

Budget Event Management Design Document

BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON

Project Report BIG-DATA CONTENT RETRIEVAL, STORAGE AND ANALYSIS FOUNDATIONS OF DATA-INTENSIVE COMPUTING. Masters in Computer Science

Comprehensive Advanced Threat Defense

What s Cooking in KNIME

PERDIX: A FRAMEWORK FOR REALTIME BEHAVIORAL EVALUATION OF SECURITY THREATS IN CLOUD COMPUTING ENVIRONMENT

WildFire Reporting. WildFire Administrator s Guide 55. Copyright Palo Alto Networks

APP DEVELOPMENT ON THE CLOUD MADE EASY WITH PAAS

Web Vulnerability Scanner by Using HTTP Method

docs.hortonworks.com

How We're Getting Creamed

McAfee Web Reporter Turning volumes of data into actionable intelligence

Security in Android apps

Guide to the LBaaS plugin ver for Fuel

A Cost Effective GPS-GPRS Based Women Tracking System and Women Safety Application using Android Mobile

IBM Security QRadar SIEM Version MR1. Vulnerability Assessment Configuration Guide

E-NOTIFIER: TRANSPORT INFORMATION SERVICES IN COLLEGES AND EXPLORING MOBILE NOTIFICATION

International Journal of Innovative Research in Computer and Communication Engineering

Mobile Cloud Computing for Data-Intensive Applications

Implementation of Botcatch for Identifying Bot Infected Hosts

Norton Mobile Privacy Notice

Deploying the BIG-IP LTM with the Cacti Open Source Network Monitoring System

Document management and exchange system supporting education process

Running a Program on an AVD

Nessus and Mobile Device Scanning. November 7, 2014 (Revision 12)

elearning for Secure Application Development

City Deploys Big Data BI Solution to Improve Lives and Create a Smart-City Template

Client Overview. Engagement Situation. Key Requirements

A Proxy-Based Data Security Solution in Mobile Cloud

locuz.com Big Data Services

ABSTRACT I. INTRODUCTION

Fight fire with fire when protecting sensitive data

VOL. 5, NO. 2, August 2015 ISSN ARPN Journal of Systems and Software AJSS Journal. All rights reserved

Arti Tyagi Sunita Choudhary

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Modeling the Mobile Application Development Lifecycle

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

MyCloudLab: An Interactive Web-based Management System for Cloud Computing Administration

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

HPE PC120 ALM Performance Center 12.0 Essentials

Search Result Optimization using Annotators

Customer Case Study. Sharethrough

They can be obtained in HQJHQH format directly from the home page at:

A QoS-Aware Web Service Selection Based on Clustering

Alert (TA14-212A) Backoff Point-of-Sale Malware

Deploying Business Virtual Appliances on Open Source Cloud Computing

Citrix Worx App SDK Overview

APPLICATION PROGRAMMING INTERFACE

How To Install Linux Titan

Fig. 1 BAN Architecture III. ATMEL BOARD

OnCommand Performance Manager 1.1

Web Forensic Evidence of SQL Injection Analysis

Lecture 10 Fundamentals of GAE Development. Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu

Web Application Firewall

tibbr Now, the Information Finds You.


K-means Clustering Technique on Search Engine Dataset using Data Mining Tool

Where every interaction matters.

User Data Analytics and Recommender System for Discovery Engine

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

qliqdirect Active Directory Guide

Baidu: Webmaster Tools Overview and Guidelines

Detection of Distributed Denial of Service Attack with Hadoop on Live Network

Big Data Analytics on Cab Company s Customer Dataset Using Hive and Tableau

A Study of Data Management Technology for Handling Big Data

SHARING THREAT INTELLIGENCE ANALYTICS FOR COLLABORATIVE ATTACK ANALYSIS

Transcription:

Journal homepage: www.mjret.in ISSN:2348-6953 MOBSAFE: ANALYSIS OF ANDROID MOBILE APPLICATIONS USING CLOUD COMPUTING AND DATA MINING Pranjali Deshmukh, Prof.Pankaj Agarakar Computer Engineering DR. D.Y.Patil School of Engineering (Affiliated Affiliated to Savitribai Phule Pune University) Pune, India pranjali2486@gmail.com,pmagarakar@gmail.com Abstract: Android is most popular due to its victim. When upload & download any apk file in android then with there are some of malicious activity are operated with android. However, for gets a security of android application, some proposals are performed. Some technologies are like to using cloud computing and data mining concepts. Mobsafe is the way that performs the methodology regarding with Cloudbroid is a mobile application proposed for cloudstack which provides user friendly interface on a mobile phone. Mobsafe is also gives us faamac i.e. forensic analysis of android mobile applications using cloud computing and K-Means algorithm for selective sort of malevolent android applications. We targeted for achieve mobile application security in android mobile. Keywords: Android platform, mobile malware detection, cloud computing, forensic analysis, machine learning, data mining, cloudstack. 1. INTRODUCTION 1.1 Threats in mobile [1] Different techniques are follow many users while downloading app in mobile, android provide a easy way for that, but while downloading that automatically brings mobile threats. It also means with this many more techniques are available for detection of malware. There are different ways of android malware origins that are suitable for spreading malwares. 1. First way is to install apps form third party market place. 2. Different market place has different defenses utility. 3. It is easy way to port an existing window based botnet client to android platform. 302 P a g e

4. An android application developers are upload their application without checking. 5. A number of applications have been modified and malwares have been packed in and spread. 1.2 Malicious behaviors of android malware 1. Privilege escalation to root. 2. Leak private data or exfiltrate sensitive data. 3. Dial premium numbers. 4. Botnet activity. 5. Backdoor triggered via SMS. 2. Works related to mobsafe To achieve security of mobile apps propose a methodology of ASEF & SAAF [1] approximate calculation, time needed to determine all the applications stored in one mobile app to filter out mobile malware. 2.1 Static analysis method Different researchers perform different analysis methods are analysis based on permission based security model and design some that is self organizing map algorithm provides twodimensional visualization of high dimensional data and also proposed crowid which uses system calls for finds malware system calls are open( ), read( ), access ( ), chmod ( ), chown ( ). Next one is presented SAAF provides program. It analyzed 136 000 benign apps and 6100 malicious app. 2.2 Dynamic behavior analysis In this proposed a methodology paranoid android that is complete malware analysis, also proposed droidmoss which takes fuzzy hashing technique. It used to perform security analysis proposed a methodology paranoid android that is complete malware analysis, also proposed droidmoss which takes fuzzy hashing technique. It used to perform security analysis with technique NFS storage and ZFS file system. 2.3 Work Principle In mobsafe we not only analyze but also checking security of android apps. Algorithm:- 1. Submit an apk file to mobsafe 2. Checking the key value store whether the apk file is analyzed & result is stored in hadoop 3. Comparison based on hashing technique of the application file as the key the redis key value store. 4. Redis version is 2.1.3, if the key matched in redis then the output is returned to submitter in the form of response. 303 P a g e

5. If the key is unmatched,it shows a new apk file. 6. After that, it invokes automatize tool such as ASEF & SAAF to collect the logs & store in hadoop directory. In this technique evaluates the security of android apps. 3. Cloudbroid [2] It is the application based on android apps & cloud stack, it is an interface between mobile and cloud users. In the cloudbroid the application that manages cloud stack management & which is based on android application using REST Principles. The main idea behind this is accessing the cloud stack system anywhere & anytime with many uses to build an own business opportunity. 3.1 Existing System There are some problems with this it is more difficult to manage cloud system on mobile & web. Another application that is implemented UI for cloudstack. 3.2 Proposed System Cloudbriod provides feature like dashboard, storage, template, account, infrastructure, event, project, package & report & also gives easy to read interface than CloudManagerAdvanced. It means we can say that the Cloudbriod overcomes the problem of Cloud Manager Advanced which is not easy to deal or understand management of cloudstack. Cloudstack is platform which contains information as service and also manages, deploys the large number of network virtual machines. In this methodology we can use most popular and useful REST Principle based on java enterprise edition tool or beans. the full meaning of the REST is a Representational State Transfer. REST performs the communication between client & server is in a difficult ways. The protocol is used for the communication HTTP. HTTP has port number eighty. 3.3. System Architecture Overview Staff Cloudbriod Cloudstack management System Manager Internet REST API ddddfdf Cloubriod Owner MY SQL Fig. 3.1 System Architecture Overview Web sever Fig 3.1 shows the system architecture view of cloudstack management and android mobile applications. It consists of mainly two parts; one part is mobile application and cloud stack management. REST API performs the activity of interacts between mobile application and cloud stack management system server. The android mobile application will send the HTTP request to the cloud stack management server. Then, the cloud stack management server will fetch the 304 P a g e

information from MySQL database and response back to the user. Cloudbroid implemented in java code on android platform 4.2.2. The application connects with cloudstack server version 4.1.1 by using HTTP Client function in java and the cloudstack API. So the total nine functions that use API command from cloudstack. Some function can only send the HTTP request to retrieve the data but cannot send HTTP POST request. 4. K-Means Algorithm Android Mobile Applications We can get security by using data mining concepts also k-means[3] and clustering algorithm. Usability and feasibility is increased day by day of mobile apps,for the purpose, increasing security of mobile apps explain the k-means technique against the malicious activity of android apps. Most of tread names in android: 1. Andriod.PDaspy 2. Andriod.Opfake 3. Andriod.Obad 4. Driod Dream trojen 5. Android.lucky cat 4.1 K-means In this mechanism, organize numerical data, or training gets are organized in vectors with a dimension equal to number of features to evaluate. K means consists of two steps: 1. Calculating the distance from training set vectors to each cluster centroid. 2. Moving the cluster centroid to the means of the respective cluster s members. 4.2 Analysis of clustering algorithm Clustering algorithm is a process of finds data patterns in huge data. Main aim is the verification of clustering algorithm applied to problem in order highten data set. K-means algorithm uses the permissions of each application as input vectors when performing cluster. Main result of clustering algorithm is that analyze permissions patterns. It means that the distribution of application into different clusters. Distribution of the application means spreads the cluster into different clusters. Density of cluster is means that how the clusters are different. 5. Android Mobile Applications using Cloud Computing It is verify all mobile apps and to cleanup malware from mobile app market by using cloud computing platform. Mobsafe defines system components & which provides plant from which the system developed.[4]. 5.1 Steps:- 305 P a g e

Submit an apk file to mobsafe Upload apk file Check hash key value Invoke tools ASEF & SAAF Follow Result Fig. 5.1 General steps in Mobsafe ASEF is atomization tool, when upload any file, ASEF performs the activity in three stages. And it launches AVD (Android virtual machine) & install application it. SAAF is a static analyzer for android apk file to analyze permission of apps match discovering patterns. 6. CONCLUSION & FUTURE SCOPE We can evaluate the security of android apps; we proposed methodology for estimation of analysis and design pattern of android apps. It is well performed on the basis of cloud and data mining. For the purpose, to perform the approximate calculation of active android apps to achieve security. It is proportion of mobile apps popularity, developed mechanism ASEF and SAAF. We also design the cloudbriod to handle android phone application and cloud system make a more easy access anywhere at any time. For future it will be achieve the security of cloud system to expand the applications to be run on any mobile platform. Malwares are also identifying in clusters, so K-Means clustering is suitable in uncovering permission pattern in complete data set and identifying malicious application based on permission request. In future work,we Will collect huge amount of data, and many apps then use k-means method as well as use neural network technology. This will also helpful for detect the more number of malicious application regarding to android mobile. We also apply the Matrix factorization to check the huge amount of data set. For testing that huge amount of data we also consider the PCA (Primary Component Analysis). 306 P a g e

ACKNOWLEGEMENT My sincere thanks to my guide and our ME Coordinator to Prof. Pankaj Agarakar, for his help and guidance. And I also thankful to our Head of Department Mr.Das and Director Mr.Sonavane sir for giving me this opportunity. I also thankful to all the staff members of the Department of Computer Engineering, Dr.D Y.PATIL(SOE) School of Engineering,Lohegaon Pune for their valuable time, support, comments, suggestions and persuasion. We would also like to thank the institute for providing the required facilities, Internet access and important books. REFERENCES [1] Zhen Chen Bin Cao Wenyu Dong Yu Guo Junwei Cao Jianlin Xu, Yifan Yu. Mobsafe: Cloud computing based forensic analysis for massive mobile applications using data mining. TSINGHUA SCIENCE AND TECHNOLOGY, 2013. [2] Paphawee Lumlert Phapan Niampoonthong Vasaka Visoottiviseth Kantiya Junhom, Sirada Semkham. Cloudbroid: An android mobile application for cloudstack management system. Third ICT International Student ProjectConference, 2014. [3] Jaykumar Karnewa Snehal Umratkar. K-means algorithm for selective _ltration of malicious android mobile applications. International Journal of Advent Research in Computer, Electronics, 2014. [4] R.C. Shivamurthy S.V. Nagendra Prasad Yadav. Faamac: Forensic analysis of android mobile applications using cloud computing. International Journal on Recent and Innovation Trends in Computing and Communication, 2014. [5] Cloudstack project, http://cloudstack.apache.org, June, 2013 [6] CloudStack, A. Understanding Apache CloudStack. 2012 20/11/2013]; Available from: http://cloudstack.apache.org /software.html 307 P a g e