Smart Devices Threats, Vulnerabilities and Malware Detection Approaches: A Survey

BalaGanesh D, Amlan Chakrabarti, Divya Midhunchakkaravarthy


In recent times, malware detection mechanism systems of mobile smart devices are getting growing concentration from researchers. With the quick expansion of malwares found in mobile devices, preventing the secrecy of mobile users is incredibly imperative and necessary. Intrusion detection systems are programming devices that consequently assemble information, dissect it and recognize such occurrences. These systems advanced to intrusion aversion systems (IPS) including extra counteractive action capacities.   In Intrusion detection systems, accuracy rate plays a significant role in measuring the effectiveness of an approach. One of the motivations of this study is to increase the true positive as well as reducing the false-positive rates beyond other studies.


Botnets; Bluetooth; Attacker; Malware; Vulnerabilities

Full Text:



. Teufl P, Ferk M, Fitzek A, Hein D, Kraxberger S, Orthacker C, “Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play).” In: Security and communication networks., 2013. doi:10.1002/sec.675

. SlideME 2013, “SlideME | android apps market: download free & paid android application.”

. García-Teodoro P, Díaz-Verdejo J, Maciá-Fernández G, Vázquez E, “Anomaly-based network intrusion detection: techniques, systems and challenges.” Computer Security, Vol. 28, pp.18–28, 2009.

. Symantec 2013, “Android ransomware predictions hold true.” http://

. Burguera I, Zurutuza U, Nadjm-Tehrani S, “Crowdroid: behavior based malware detection system for android.” In: Proceedings of the 1st ACM workshop on security and privacy in smartphones and mobile devices, Chicago, USA, pp 15–26, 2011.

. Arstechnica 2013, “More BadNews for android: new malicious apps found in google play.” 04/more-badnews-for-android-new-malicious-apps-found-in-google-play/.

. F-Secure 2013, “Android accounted for 79% of all mobile malware in 2012, 96% in Q4 alone.”

. Hardwarezone (2013) Trend micro predicts android malware increase by 185%.

. Yajin Z, Xuxian J, “Dissecting android malware: characterization and evolution.” In: Proceedings of the IEEE symposium on security and privacy (SP), San Fransico, USA, pp 95–109, 2012.

. “NetQin Tech. Co. Ltd. Wince.cxover.a.”, 2009.

. Oxygen Software Company. Oxygen forensic suite 2010., 2010.

. M. Piercy, “Embedded devices next on the virus target list” IEEE Electronics Systems and Software, Vol.2, pp.42-43, December-January, 2004.

. Sampath Deegalla and Henrik Bostrom, “Reducing high-dimensional data by principal component analysis vs. random projection for nearest neighbor classification” In ICMLA '06: Proceedings of the 5th International Conference on Machine Learning and Applications, IEEE Computer Society, pages 245-250, Washington, DC, USA, 2006.

. Inc. Conexant Systems. Commands for host-processed and host-controlled modems reference manual., April 2001.

. Microsoft Corporation. Windows mobile., 2007.

. Ross Anderson, “Security Engineering: A Guide to Building Dependable Distributed Systems” chapter 10, Monitoring Systems, pages 207-230. Wiley & Sons, 2001.

. Leonid Batyuk, Aubrey-Derrick Schmidt, Hans-Gunther Schmidt, Ahmet Camtepe, and Sahin Albayrak, “Developing and benchmarking native Linux applications on Android.” In Mobile Wireless Middleware,Operating Systems, and Applications, 2009.

. Stephen Hofmeyr and Stephanie Forrest, “Architecture for an Artificial Immune System” Evolutionary Computation Journal, Vol. 8, Issue. 4, pp:443-473, 2000.

. Stefan Axelsson, “Intrusion detection systems: A survey and taxonomy” Technical Report 99, Department of Computer Engineering Chalmers University of Technology Goteborg, Sweden, March 2000.

. Daniel Lowry Lough, “A taxonomy of computer attacks with applications to wireless networks” PhD thesis, Virginia Polytechnic Institute and State University, 2001. Chairman-Davis,IV, Nathaniel J.

. A.A.E. Ahmed and I. Traore, “A new biometric technology based on mouse dynamics” IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 4 No. 3, pp:165, 2007.

. Gregory D. Abowd, Liviu Iftode, and Helena Mitchel, “The smart phone: A first platform for pervasive computing” IEEE Pervasive Computing, Vol.4, No. 2, pp:18-19, April-June 2005.

. Karen Scarfone and Peter Mell, “Guide to intrusion detection and prevention systems (idps).”, February 2007. National Institute of Standards and Technology (NIST) Special Publication 800-94.

. Christopher Kruegel, Fredrik Valeur, and Giovanni Vigna, “Intrusion Detection and Correlation: Challenges and Solutions” Springer-Verlag TELOS, Santa Clara, CA, USA, 2004.

. Vern Paxson, “Bro: a system for detecting network intruders in realtime” In SSYM'98: Proceedings of the 7th conference on USENIX Security Symposium, 1998, pages 33, Berkeley, CA, USA, 1998. USENIX Association.

. Gregory White and Vdo Pooch, “Cooperating security managers: Distributed intrusion detection systems” Elsevier Computers & Security, Vol.15, No.5, pp:441- 450, 1996.

. Teresa F. Lunt, R. Jagannathan, Rosanna Lee, Sherry Listgarten, David L. Edwards, Peter G. Neumann, Harold S. Javitz, and A. Valdes, “Ides: The enhanced prototype, a real-time intrusion detection system” Technical Report Technical Report SRI Project 4185-010, SRI-CSL-88-12, CSL SRI International, Computer Science Laboratory, 1988.

. Albert J. Hoglund, Kimmo Hatonen, and Antti S. Sorvari, “A computer host-based user anomaly detection system using the self-organizing map” In IJCNN '00: Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks (IJCNN'00)-Volume 5, page 5411, Washington, DC, USA, 2000. IEEE Computer Society.

. Anderson, Lunt, Javits, Tamaru, and Valdes, “Detecting unusual program behavior using the statistical components of NIDES” Technical report, Computer Science Laboratory, May 1995.



  • There are currently no refbacks.

Copyright (c) 2018 BalaGanesh D, Divya Midhunchakkaravarthy