Root exploit detection and features optimization: Mobile device and blockchain based medical data management

The increasing demand for Android mobile devices and blockchain has motivated malware creators to develop mobile malware to compromise the blockchain. Although the blockchain is secure, attackers have managed to gain access into the blockchain as legal users, thereby comprising important and crucial...

Full description

Saved in:
Bibliographic Details
Main Authors: Ahmad Firdaus, Zainal Abidin, Nor Badrul, Anuar, Mohd Faizal, Ab Razak, Targio Hashem, Ibrahim Abaker, Syafiq, Bachok, Sangaiah, Arun Kumar
Format: Article
Language:English
Published: Springer New York 2018
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/23001/1/Root%20exploit%20detection%20and%20features%20optimization-%20Mobile%20device%20and%20blockchain%20based%20medical%20data%20management.pdf
http://umpir.ump.edu.my/id/eprint/23001/
https://link.springer.com/article/10.1007/s10916-018-0966-x
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Malaysia Pahang
Language: English
id my.ump.umpir.23001
record_format eprints
spelling my.ump.umpir.230012018-12-03T08:43:57Z http://umpir.ump.edu.my/id/eprint/23001/ Root exploit detection and features optimization: Mobile device and blockchain based medical data management Ahmad Firdaus, Zainal Abidin Nor Badrul, Anuar Mohd Faizal, Ab Razak Targio Hashem, Ibrahim Abaker Syafiq, Bachok Sangaiah, Arun Kumar QA76 Computer software The increasing demand for Android mobile devices and blockchain has motivated malware creators to develop mobile malware to compromise the blockchain. Although the blockchain is secure, attackers have managed to gain access into the blockchain as legal users, thereby comprising important and crucial information. Examples of mobile malware include root exploit, botnets, and Trojans and root exploit is one of the most dangerous malware. It compromises the operating system kernel in order to gain root privileges which are then used by attackers to bypass the security mechanisms, to gain complete control of the operating system, to install other possible types of malware to the devices, and finally, to steal victims’ private keys linked to the blockchain. For the purpose of maximizing the security of the blockchain-based medical data management (BMDM), it is crucial to investigate the novel features and approaches contained in root exploit malware. This study proposes to use the bio-inspired method of practical swarm optimization (PSO) which automatically select the exclusive features that contain the novel android debug bridge (ADB). This study also adopts boosting (adaboost, realadaboost, logitboost, and multiboost) to enhance the machine learning prediction that detects unknown root exploit, and scrutinized three categories of features including (1) system command, (2) directory path and (3) code-based. The evaluation gathered from this study suggests a marked accuracy value of 93% with Logitboost in the simulation. Logitboost also helped to predicted all the root exploit samples in our developed system, the root exploit detection system (RODS). Springer New York 2018 Article PeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/23001/1/Root%20exploit%20detection%20and%20features%20optimization-%20Mobile%20device%20and%20blockchain%20based%20medical%20data%20management.pdf Ahmad Firdaus, Zainal Abidin and Nor Badrul, Anuar and Mohd Faizal, Ab Razak and Targio Hashem, Ibrahim Abaker and Syafiq, Bachok and Sangaiah, Arun Kumar (2018) Root exploit detection and features optimization: Mobile device and blockchain based medical data management. Journal of Medical Systems, 42 (6). pp. 1-23. ISSN 0148-5598 https://link.springer.com/article/10.1007/s10916-018-0966-x DOI: 10.1007/s10916-018-0966-x
institution Universiti Malaysia Pahang
building UMP Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaysia Pahang
content_source UMP Institutional Repository
url_provider http://umpir.ump.edu.my/
language English
topic QA76 Computer software
spellingShingle QA76 Computer software
Ahmad Firdaus, Zainal Abidin
Nor Badrul, Anuar
Mohd Faizal, Ab Razak
Targio Hashem, Ibrahim Abaker
Syafiq, Bachok
Sangaiah, Arun Kumar
Root exploit detection and features optimization: Mobile device and blockchain based medical data management
description The increasing demand for Android mobile devices and blockchain has motivated malware creators to develop mobile malware to compromise the blockchain. Although the blockchain is secure, attackers have managed to gain access into the blockchain as legal users, thereby comprising important and crucial information. Examples of mobile malware include root exploit, botnets, and Trojans and root exploit is one of the most dangerous malware. It compromises the operating system kernel in order to gain root privileges which are then used by attackers to bypass the security mechanisms, to gain complete control of the operating system, to install other possible types of malware to the devices, and finally, to steal victims’ private keys linked to the blockchain. For the purpose of maximizing the security of the blockchain-based medical data management (BMDM), it is crucial to investigate the novel features and approaches contained in root exploit malware. This study proposes to use the bio-inspired method of practical swarm optimization (PSO) which automatically select the exclusive features that contain the novel android debug bridge (ADB). This study also adopts boosting (adaboost, realadaboost, logitboost, and multiboost) to enhance the machine learning prediction that detects unknown root exploit, and scrutinized three categories of features including (1) system command, (2) directory path and (3) code-based. The evaluation gathered from this study suggests a marked accuracy value of 93% with Logitboost in the simulation. Logitboost also helped to predicted all the root exploit samples in our developed system, the root exploit detection system (RODS).
format Article
author Ahmad Firdaus, Zainal Abidin
Nor Badrul, Anuar
Mohd Faizal, Ab Razak
Targio Hashem, Ibrahim Abaker
Syafiq, Bachok
Sangaiah, Arun Kumar
author_facet Ahmad Firdaus, Zainal Abidin
Nor Badrul, Anuar
Mohd Faizal, Ab Razak
Targio Hashem, Ibrahim Abaker
Syafiq, Bachok
Sangaiah, Arun Kumar
author_sort Ahmad Firdaus, Zainal Abidin
title Root exploit detection and features optimization: Mobile device and blockchain based medical data management
title_short Root exploit detection and features optimization: Mobile device and blockchain based medical data management
title_full Root exploit detection and features optimization: Mobile device and blockchain based medical data management
title_fullStr Root exploit detection and features optimization: Mobile device and blockchain based medical data management
title_full_unstemmed Root exploit detection and features optimization: Mobile device and blockchain based medical data management
title_sort root exploit detection and features optimization: mobile device and blockchain based medical data management
publisher Springer New York
publishDate 2018
url http://umpir.ump.edu.my/id/eprint/23001/1/Root%20exploit%20detection%20and%20features%20optimization-%20Mobile%20device%20and%20blockchain%20based%20medical%20data%20management.pdf
http://umpir.ump.edu.my/id/eprint/23001/
https://link.springer.com/article/10.1007/s10916-018-0966-x
_version_ 1643669494732685312