2020
DOI: 10.1371/journal.pone.0238694
|View full text |Cite
|
Sign up to set email alerts
|

A detection method for android application security based on TF-IDF and machine learning

Abstract: Android is the most widely used mobile operating system (OS). A large number of thirdparty Android application (app) markets have emerged. The absence of third-party market regulation has prompted research institutions to propose different malware detection techniques. However, due to improvements of malware itself and Android system, it is difficult to design a detection method that can efficiently and effectively detect malicious apps for a long time. Meanwhile, adopting more features will increase the compl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 35 publications
(13 citation statements)
references
References 54 publications
0
13
0
Order By: Relevance
“…What's more noteworthy is that defining the usage of API calls in a single part of the Android platform allows for the creation of the most representative function space or the resources where malicious and benign can be distinguished more easily [54], [55]. If the amount of the classification target is greater than the probability estimates, the classification target of the testing data is then calculated as that label [56]. The objects are Blue or Red; the dividing lines identify the border, so an object on the right side is called blue, meaning benign, a general scenario and likewise.…”
Section: ) Algorithm Characteristics Appraisalmentioning
confidence: 99%
“…What's more noteworthy is that defining the usage of API calls in a single part of the Android platform allows for the creation of the most representative function space or the resources where malicious and benign can be distinguished more easily [54], [55]. If the amount of the classification target is greater than the probability estimates, the classification target of the testing data is then calculated as that label [56]. The objects are Blue or Red; the dividing lines identify the border, so an object on the right side is called blue, meaning benign, a general scenario and likewise.…”
Section: ) Algorithm Characteristics Appraisalmentioning
confidence: 99%
“…The N-gram TF-IDF feature model has been used in cyber security applications such as software vulnerability assessments [47], [48] and cyber threat detection [49], [50], [51], [52]. The authors of [47] used TF-IDF features extracted from bug reports to develop a tool for identifying software bugs.…”
Section: Related Workmentioning
confidence: 99%
“…The term frequency (TF) in documents refers to the number of times a word appears in the text. The inverse document frequency (IDF) is an indicator of a word's overall value [15]. • (word2vec): Word2vec is a neural network that processes data using two layers.…”
Section: Text Preprocessing and Feature Extraction Techniquesmentioning
confidence: 99%