Android traffic malware analysis and detection using ensemble classifier

被引:2
作者
Mohanraj, A. [1 ]
Sivasankari, K. [2 ]
机构
[1] Sri Eshwar Coll Engn, Dept Comp Sci & Engn, Coimbatore 641202, Tamil Nadu, India
[2] Akshaya Coll Engn & Technol, Dept Elect & Commun Engn, Coimbatore 642109, Tamil Nadu, India
关键词
Malware detection; Machine learning; Malware variants; Malware Classifications;
D O I
10.1016/j.asej.2024.103134
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper introduces the Systematic mAlware detection in android (STAR) technique designed to enhance accuracy in identifying and classifying Android malware, addressing significant concerns regarding device security and data privacy. The STAR method involves comprehensive data collection from diverse datasets, rigorous preprocessing for data quality improvement, and feature extraction using Principal Component Analysis (PCA). Butterfly optimization ensures selection of pertinent features, while ensemble classifiers including Bagging, AdaBoost, and LogitBoost are employed for robust model creation. Final classification is achieved via majority voting. Experimental validation demonstrates that STAR outperforms existing techniques such as ERBE, DeLADY, and MSFDROID, achieving detection rates 4.34 %, 1.41 %, and 2.52 % higher respectively. This innovative approach underscores its potential in mitigating the evolving threat landscape of Android malware, offering a promising avenue for enhancing mobile app security.
引用
收藏
页数:11
相关论文
共 30 条
[1]   A Study of Cyber Security Awareness in Educational Environment in the Middle East [J].
Al-Janabi, Samaher ;
Al-Shourbaji, Ibrahim .
JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT, 2016, 15 (01)
[2]   ReDroidDet: Android Malware Detection Based on Recurrent Neural Network [J].
Almahmoud, Mothanna ;
Alzu'bi, Dalia ;
Yaseen, Qussai .
12TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT) / THE 4TH INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40) / AFFILIATED WORKSHOPS, 2021, 184 :841-846
[3]  
Chinetha K., 2015, INT J ENG APPL SCI, V2
[4]   Big Data and Service Operations [J].
Cohen, Maxime C. .
PRODUCTION AND OPERATIONS MANAGEMENT, 2018, 27 (09) :1709-1723
[5]  
Dhipa M, 2023, Int J Data Sci Artificial Intelligence, V01, P21
[6]   Users of the main smartphone operating systems (iOS, Android) differ only little in personality [J].
Goetz, Friedrich M. ;
Stieger, Stefan ;
Reips, Ulf-Dietrich .
PLOS ONE, 2017, 12 (05)
[7]   Deep Learning-Based Attack Detection and Classification in Android Devices [J].
Gomez, Alfonso ;
Munoz, Antonio .
ELECTRONICS, 2023, 12 (15)
[8]   GSEDroid: GNN-based Android malware detection framework using lightweight semantic embedding [J].
Gu, Jintao ;
Zhu, Hongliang ;
Han, Zewei ;
Li, Xiangyu ;
Zhao, Jianjin .
COMPUTERS & SECURITY, 2024, 140
[9]   Android Ransomware Detection From Traffic Analysis Using Metaheuristic Feature Selection [J].
Hossain, Md. Sakir ;
Hasan, Naim ;
Samad, Md. Abdus ;
Shakhawat, Hossain M. D. ;
Karmoker, Joydeep ;
Ahmed, Foysol ;
Fuad, K. F. M. Nafiz ;
Choi, Kwonhue .
IEEE ACCESS, 2022, 10 :128754-128763
[10]  
Jacobsen KM, 2017, GEORGE WASH LAW REV, V85, P566