Detection of Social Media Exploitation via SMS and Camera

Internet users all over the world are highly exposed to social media exploitation, where they are vulnerable to be targeted by this cyber-attack. Furthermore, excessive use of social media leads to Internet Addiction Disorder (IAD). Fortunately, social media exploitation and IAD can be monitored and...

Full description

Bibliographic Details
Main Authors: Mohamad Adib Azhar, Madihah Mohd Saudi, Azuan Ahmad, Azreena Abu Bakar
Format: Article
Language:English
Published: International Association of Online Engineering (IAOE) 2019-04-01
Series:International Journal of Interactive Mobile Technologies
Subjects:
API
SMS
Online Access:https://online-journals.org/index.php/i-jim/article/view/10521
id doaj-5553792338514d55b183553549ae08f5
record_format Article
spelling doaj-5553792338514d55b183553549ae08f52021-09-02T07:06:54ZengInternational Association of Online Engineering (IAOE)International Journal of Interactive Mobile Technologies1865-79232019-04-011304617910.3991/ijim.v13i04.105214373Detection of Social Media Exploitation via SMS and CameraMohamad Adib Azhar0Madihah Mohd Saudi1Azuan Ahmad2Azreena Abu Bakar3Faculty of Science & Technology (FST), Universiti Sains Islam Malaysia (USIM), Nilai, MalaysiaCyberSecurity & Systems Research Unit, Islamic Science Institute (ISI), USIM, Faculty of Science & Technology (FST), Universiti Sains Islam Malaysia (USIM), Nilai, MalaysiaCyberSecurity & Systems Research Unit, Islamic Science Institute (ISI), USIM, Faculty of Science & Technology (FST), Universiti Sains Islam Malaysia (USIM), Nilai, MalaysiaFaculty of Science & Technology (FST), Universiti Sains Islam Malaysia (USIM), Nilai, MalaysiaInternet users all over the world are highly exposed to social media exploitation, where they are vulnerable to be targeted by this cyber-attack. Furthermore, excessive use of social media leads to Internet Addiction Disorder (IAD). Fortunately, social media exploitation and IAD can be monitored and controlled closely based on user’s mobile phone surveillance features which are camera, SMS, audio, geolocation (GPS) and call log. Hence to overcome these challenges, this paper presents five (5) Application Programming Interfaces (APIs) and four (4) permissions for SMS and camera that are mostly and widely used with the social media applications. These 9 APIs and permissions matched with 2.7% of the APIs and permissions training dataset that are related with SMS and camera. This experiment was conducted by using hybrid analysis, which inclusive of static analysis and dynamic analysis, with 1926 training dataset from Brunswick. These 9 APIs and permissions, if being misused by the attacker, could lead to privacy concerns of a mobile device. The finding from this paper can be used as a guidance and reference for the formation of new mobile malware detection technique and modeling in future.https://online-journals.org/index.php/i-jim/article/view/10521Social media exploitationAPIpermissionSMScameramobile malwaresmobile phone surveillance feature
collection DOAJ
language English
format Article
sources DOAJ
author Mohamad Adib Azhar
Madihah Mohd Saudi
Azuan Ahmad
Azreena Abu Bakar
spellingShingle Mohamad Adib Azhar
Madihah Mohd Saudi
Azuan Ahmad
Azreena Abu Bakar
Detection of Social Media Exploitation via SMS and Camera
International Journal of Interactive Mobile Technologies
Social media exploitation
API
permission
SMS
camera
mobile malwares
mobile phone surveillance feature
author_facet Mohamad Adib Azhar
Madihah Mohd Saudi
Azuan Ahmad
Azreena Abu Bakar
author_sort Mohamad Adib Azhar
title Detection of Social Media Exploitation via SMS and Camera
title_short Detection of Social Media Exploitation via SMS and Camera
title_full Detection of Social Media Exploitation via SMS and Camera
title_fullStr Detection of Social Media Exploitation via SMS and Camera
title_full_unstemmed Detection of Social Media Exploitation via SMS and Camera
title_sort detection of social media exploitation via sms and camera
publisher International Association of Online Engineering (IAOE)
series International Journal of Interactive Mobile Technologies
issn 1865-7923
publishDate 2019-04-01
description Internet users all over the world are highly exposed to social media exploitation, where they are vulnerable to be targeted by this cyber-attack. Furthermore, excessive use of social media leads to Internet Addiction Disorder (IAD). Fortunately, social media exploitation and IAD can be monitored and controlled closely based on user’s mobile phone surveillance features which are camera, SMS, audio, geolocation (GPS) and call log. Hence to overcome these challenges, this paper presents five (5) Application Programming Interfaces (APIs) and four (4) permissions for SMS and camera that are mostly and widely used with the social media applications. These 9 APIs and permissions matched with 2.7% of the APIs and permissions training dataset that are related with SMS and camera. This experiment was conducted by using hybrid analysis, which inclusive of static analysis and dynamic analysis, with 1926 training dataset from Brunswick. These 9 APIs and permissions, if being misused by the attacker, could lead to privacy concerns of a mobile device. The finding from this paper can be used as a guidance and reference for the formation of new mobile malware detection technique and modeling in future.
topic Social media exploitation
API
permission
SMS
camera
mobile malwares
mobile phone surveillance feature
url https://online-journals.org/index.php/i-jim/article/view/10521
work_keys_str_mv AT mohamadadibazhar detectionofsocialmediaexploitationviasmsandcamera
AT madihahmohdsaudi detectionofsocialmediaexploitationviasmsandcamera
AT azuanahmad detectionofsocialmediaexploitationviasmsandcamera
AT azreenaabubakar detectionofsocialmediaexploitationviasmsandcamera
_version_ 1721178651210285056