Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management

The increasing demand for Android mobile devices and blockchain has motivated malware creators to develop mobile malware to compromise the blockchain. Although the blockchain is secure, attackers have managed to gain access into the blockchain as legal users, thereby comprising important and crucial...

Full description

Bibliographic Details
Main Authors: Firdaus, Ahmad, Anuar, Nor Badrul, Razak, Mohd Faizal Ab, Hashem, Ibrahim Abaker Targio, Bachok, Syafiq, Sangaiah, Arun Kumar
Format: Article
Published: Springer Verlag 2018
Subjects:
_version_ 1825721806368014336
author Firdaus, Ahmad
Anuar, Nor Badrul
Razak, Mohd Faizal Ab
Hashem, Ibrahim Abaker Targio
Bachok, Syafiq
Sangaiah, Arun Kumar
author_facet Firdaus, Ahmad
Anuar, Nor Badrul
Razak, Mohd Faizal Ab
Hashem, Ibrahim Abaker Targio
Bachok, Syafiq
Sangaiah, Arun Kumar
author_sort Firdaus, Ahmad
collection UM
description The increasing demand for Android mobile devices and blockchain has motivated malware creators to develop mobile malware to compromise the blockchain. Although the blockchain is secure, attackers have managed to gain access into the blockchain as legal users, thereby comprising important and crucial information. Examples of mobile malware include root exploit, botnets, and Trojans and root exploit is one of the most dangerous malware. It compromises the operating system kernel in order to gain root privileges which are then used by attackers to bypass the security mechanisms, to gain complete control of the operating system, to install other possible types of malware to the devices, and finally, to steal victims’ private keys linked to the blockchain. For the purpose of maximizing the security of the blockchain-based medical data management (BMDM), it is crucial to investigate the novel features and approaches contained in root exploit malware. This study proposes to use the bio-inspired method of practical swarm optimization (PSO) which automatically select the exclusive features that contain the novel android debug bridge (ADB). This study also adopts boosting (adaboost, realadaboost, logitboost, and multiboost) to enhance the machine learning prediction that detects unknown root exploit, and scrutinized three categories of features including (1) system command, (2) directory path and (3) code-based. The evaluation gathered from this study suggests a marked accuracy value of 93% with Logitboost in the simulation. Logitboost also helped to predicted all the root exploit samples in our developed system, the root exploit detection system (RODS).
first_indexed 2024-03-06T05:55:57Z
format Article
id um.eprints-22074
institution Universiti Malaya
last_indexed 2024-03-06T05:55:57Z
publishDate 2018
publisher Springer Verlag
record_format dspace
spelling um.eprints-220742019-08-26T06:35:21Z http://eprints.um.edu.my/22074/ Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management Firdaus, Ahmad Anuar, Nor Badrul Razak, Mohd Faizal Ab Hashem, Ibrahim Abaker Targio Bachok, Syafiq Sangaiah, Arun Kumar QA75 Electronic computers. Computer science The increasing demand for Android mobile devices and blockchain has motivated malware creators to develop mobile malware to compromise the blockchain. Although the blockchain is secure, attackers have managed to gain access into the blockchain as legal users, thereby comprising important and crucial information. Examples of mobile malware include root exploit, botnets, and Trojans and root exploit is one of the most dangerous malware. It compromises the operating system kernel in order to gain root privileges which are then used by attackers to bypass the security mechanisms, to gain complete control of the operating system, to install other possible types of malware to the devices, and finally, to steal victims’ private keys linked to the blockchain. For the purpose of maximizing the security of the blockchain-based medical data management (BMDM), it is crucial to investigate the novel features and approaches contained in root exploit malware. This study proposes to use the bio-inspired method of practical swarm optimization (PSO) which automatically select the exclusive features that contain the novel android debug bridge (ADB). This study also adopts boosting (adaboost, realadaboost, logitboost, and multiboost) to enhance the machine learning prediction that detects unknown root exploit, and scrutinized three categories of features including (1) system command, (2) directory path and (3) code-based. The evaluation gathered from this study suggests a marked accuracy value of 93% with Logitboost in the simulation. Logitboost also helped to predicted all the root exploit samples in our developed system, the root exploit detection system (RODS). Springer Verlag 2018 Article PeerReviewed Firdaus, Ahmad and Anuar, Nor Badrul and Razak, Mohd Faizal Ab and Hashem, Ibrahim Abaker Targio and Bachok, Syafiq and Sangaiah, Arun Kumar (2018) Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management. Journal of Medical Systems, 42 (6). p. 112. ISSN 0148-5598, DOI https://doi.org/10.1007/s10916-018-0966-x <https://doi.org/10.1007/s10916-018-0966-x>. https://doi.org/10.1007/s10916-018-0966-x doi:10.1007/s10916-018-0966-x
spellingShingle QA75 Electronic computers. Computer science
Firdaus, Ahmad
Anuar, Nor Badrul
Razak, Mohd Faizal Ab
Hashem, Ibrahim Abaker Targio
Bachok, Syafiq
Sangaiah, Arun Kumar
Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management
title Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management
title_full Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management
title_fullStr Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management
title_full_unstemmed Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management
title_short Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management
title_sort root exploit detection and features optimization mobile device and blockchain based medical data management
topic QA75 Electronic computers. Computer science
work_keys_str_mv AT firdausahmad rootexploitdetectionandfeaturesoptimizationmobiledeviceandblockchainbasedmedicaldatamanagement
AT anuarnorbadrul rootexploitdetectionandfeaturesoptimizationmobiledeviceandblockchainbasedmedicaldatamanagement
AT razakmohdfaizalab rootexploitdetectionandfeaturesoptimizationmobiledeviceandblockchainbasedmedicaldatamanagement
AT hashemibrahimabakertargio rootexploitdetectionandfeaturesoptimizationmobiledeviceandblockchainbasedmedicaldatamanagement
AT bachoksyafiq rootexploitdetectionandfeaturesoptimizationmobiledeviceandblockchainbasedmedicaldatamanagement
AT sangaiaharunkumar rootexploitdetectionandfeaturesoptimizationmobiledeviceandblockchainbasedmedicaldatamanagement