Skip to main content

Document details - Automating the process of browsing and downloading APK Files as a prerequisite for the Malware Detection process

Journal Volume 9, Issue 2, March - April 2020, Article 9472146 Prerna Agrawal, Bhushan Trivedi , " Automating the process of browsing and downloading APK Files as a prerequisite for the Malware Detection process" , International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) , Volume 9, Issue 2, March - April 2020 , pp. 013-017 , ISSN 2278 - 6856.

Automating the process of browsing and downloading APK Files as a prerequisite for the Malware Detection process

    Prerna Agrawal, Bhushan Trivedi

Abstract

Abstract: Android has grown to the world’s one of the largest mobile platforms. Android applications are capable of performing any functionality in the mobile platform. Android applications are also vulnerable to malware. So our goal in this paper is to collect Malware files of generalized Malware Families which will help us as well as other researchers also to conduct experiments for Malware Detection. Here we propose the process for automating browsing and downloading the APK files. We have also developed and implemented our Crawler to automate the process of browsing and downloading the files. We have downloaded Malware and Benign files from the most popular Android Malware Projects. Using this process we have collected around 15508 Malware files and 4000 Benign Files. We have also discussed our Malware Detection process and we have covered the Android File collection phase in this paper. Keywords: Machine Learning, Android, Malware, Android Security, Malware Detection, Mobile Security

  • ISSN: 22786856
  • Source Type: Journal
  • Original language: English

Cited by 0 documents

Related documents

{"topic":{"name":"Order Picking; AS/RS; Warehouses","id":5729,"uri":"Topic/5729","prominencePercentile":98.30173,"prominencePercentileString":"98.302","overallScholarlyOutput":0},"dig":"7972b85ca5bc948c1a2f0423f8150b186ec6bb8cf32afac11c4a324b8d78fb11"}