Binary and multi-class classification of Android applications using static features

被引:0
作者
Dhalaria, Meghna [1 ]
Gandotra, Ekta [1 ]
机构
[1] Jaypee Univ Informat Technol Waknaghat, Dept Comp Sci & Engn, Solan, Himachal Prades, India
关键词
android malware; binary classification; deep learning; machine learning; multiclass classification; static features; APPS;
D O I
10.1504/IJAMS.2023.131670
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
Android has dominated the smart phone market in recent years. As a result, there is a massive increase in Android applications. Due to the increasing number of applications and users' dependence on these, Android has become a prime target for attackers. Hence, there is a need for new malware detection methods. Machine learning algorithms are being used for this purpose. This paper proposes a framework which is capable of performing binary and multi-classification of Android applications. Machine learning algorithms are used on a self-created dataset to classify Android applications into malicious and benign. Further, the malicious applications are classified into their families using the same machine learning algorithms. It is concluded that the accuracy of classification of malicious applications into the families gives very less accuracy (86.70% achieved by Random Forest) as compared to the binary classification accuracy (96.50% achieved by Random Forest).
引用
收藏
页码:117 / 140
页数:25
相关论文
共 35 条
[1]  
[Anonymous], 2018, MCAF LABS THREAT PRE
[2]  
Apvrille A., 2014, Virus Bul., P1
[3]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[4]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[5]   A Probabilistic Discriminative Model for Android Malware Detection with Decompiled Source Code [J].
Cen, Lei ;
Gates, Christoher S. ;
Si, Luo ;
Li, Ninghui .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (04) :400-412
[6]  
Chizi B, 2010, DATA MINING AND KNOWLEDGE DISCOVERY HANDBOOK, SECOND EDITION, P83, DOI 10.1007/978-0-387-09823-4_5
[7]  
Cover T. A., 2006, Elements of information theory, V2nd
[8]  
Dhalaria M., 2019, P ADV COMP DAT SCI 3, P370
[9]  
Dietterich TG, 1994, J ARTIF INTELL RES, V2, P263
[10]   On the optimality of the simple Bayesian classifier under zero-one loss [J].
Domingos, P ;
Pazzani, M .
MACHINE LEARNING, 1997, 29 (2-3) :103-130