Android Malware Detection using Feature Ranking of Permissions

01/20/2022
by   Muhammad Suleman Saleem, et al.
0

We investigate the use of Android permissions as the vehicle to allow for quick and effective differentiation between benign and malware apps. To this end, we extract all Android permissions, eliminating those that have zero impact, and apply two feature ranking algorithms namely Chi-Square test and Fisher's Exact test to rank and additionally filter them, resulting in a comparatively small set of relevant permissions. Then we use Decision Tree, Support Vector Machine, and Random Forest Classifier algorithms to detect malware apps. Our analysis indicates that this approach can result in better accuracy and F-score value than other reported approaches. In particular, when random forest is used as the classifier with the combination of Fisher's Exact test, we achieve 99.34% in accuracy and 92.17% in F-score with the false positive rate of 0.56% for the dataset in question, with results improving to 99.82% in accuracy and 95.28% in F-score with the false positive rate as low as 0.05% when only malware from three most popular malware families are considered.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/21/2019

Android Malicious Application Classification Using Clustering

Android malware have been growing at an exponential pace and becomes a s...
research
07/23/2021

Dynamic detection of mobile malware using smartphone data and machine learning

Mobile malware are malicious programs that target mobile devices. They a...
research
02/08/2023

Continuous Learning for Android Malware Detection

Machine learning methods can detect Android malware with very high accur...
research
04/19/2017

Semi-supervised classification for dynamic Android malware detection

A growing number of threats to Android phones creates challenges for mal...
research
03/02/2019

Clicktok: Click Fraud Detection using Traffic Analysis

Advertising is a primary means for revenue generation for millions of we...
research
11/03/2022

Reliable Malware Analysis and Detection using Topology Data Analysis

Increasingly, malwares are becoming complex and they are spreading on ne...
research
09/06/2020

Automatic Yara Rule Generation Using Biclustering

Yara rules are a ubiquitous tool among cybersecurity practitioners and a...

Please sign up or login with your details

Forgot password? Click here to reset