Towards predictive analysis of android vulnerability using statistical codes and machine learning for IoT applications

被引:22
作者
Cui, Jianfeng [1 ]
Wang, Lixin [1 ]
Zhao, Xin [2 ]
Zhang, Hongyi [2 ]
机构
[1] Xiamen Univ Technol, Sch Comp & Informat Engn, Xiamen, Peoples R China
[2] Xiamen Univ Technol, Sch Optoelect & Commun Engn, Xiamen, Peoples R China
关键词
Android vulnerability; Prediction; IoT applications; Software metrics; Machine learning; INDICATORS; QUALITY; METRICS;
D O I
10.1016/j.comcom.2020.02.078
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, the Internet of Things (IoT) technology is used for several applications for exchanging information among various devices. The intelligent IoT based system utilizes an Android operating system because it is also primarily used in mobile devices. One of the main problems for different IoT applications is associated with android vulnerability is its complicated and large size. To overcome the main issue of IoT, the existing studies have proposed several effective prediction models using machine learning algorithms and software metrics. In this paper, we are focused on conducting android vulnerability prediction analysis using machine learning for intelligent IoT applications. We conducted an empirical investigation for examining security risk prediction of 1406 Android applications with varying levels of risk using a metric set of 21 static code metrics and 6 machine learning (ML) techniques. It is observed from results that ML algorithms have different performances for predicting security risks. RF algorithm performs better for Android applications of all risk levels. By analyzing the findings of the conducted empirical study, it is suggested that developers may consider object-oriented metrics and RF algorithm in the software development process for android based intelligent IoT systems.
引用
收藏
页码:125 / 131
页数:7
相关论文
共 42 条
[1]  
[Anonymous], [No title captured]
[2]  
[Anonymous], [No title captured]
[3]  
[Anonymous], [No title captured]
[4]  
[Anonymous], P 2012 ACM C COMP CO
[5]  
[Anonymous], P 2013 ACM SIGSAC C
[6]  
[Anonymous], [No title captured]
[7]  
[Anonymous], [No title captured]
[8]  
[Anonymous], [No title captured]
[9]  
[Anonymous], 2007, ACM C COMP COMM SEC
[10]  
[Anonymous], [No title captured]