2023
DOI: 10.1186/s42400-023-00139-y
|View full text |Cite
|
Sign up to set email alerts
|

Android malware category detection using a novel feature vector-based machine learning model

Abstract: Malware attacks on the Android platform are rapidly increasing due to the high consumer adoption of Android smartphones. Advanced technologies have motivated cyber-criminals to actively create and disseminate a wide range of malware on Android smartphones. The researchers have conducted numerous studies on the detection of Android malware, but the majority of the works are based on the detection of generic Android malware. The detection based on malware categories will provide more insights about the malicious… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(7 citation statements)
references
References 34 publications
0
7
0
Order By: Relevance
“…Tong et al [27] suggested a signature based mechanism to detect Android malware apps by comparing with normal and malicious syscall patterns. Haridos et al [28] suggested an ML based mechanism to detect Android malware apps from the novel Huffman encoded feature vectors of syscall sequences. The drawbacks of these above existing syscall based malware detection mechanisms are given in Table 1.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…Tong et al [27] suggested a signature based mechanism to detect Android malware apps by comparing with normal and malicious syscall patterns. Haridos et al [28] suggested an ML based mechanism to detect Android malware apps from the novel Huffman encoded feature vectors of syscall sequences. The drawbacks of these above existing syscall based malware detection mechanisms are given in Table 1.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Category DrawBacks Burguera et al [20] Syscall relationship is missing Xiao et al [29] High dimensionality of feature vectors Tong et al [27] Unable to detect repacking attacks Canfora et al [26] High dimentionality of feature vectors Tong et al [27] Unable to detect repacking attacks Haridos et al [28] Syscall relationship is missing Xiao et al [30] High dimentionality of feature vectors Bhandari et al [24] Feature extraction cost is high Bernadi et al [23] Requires multiple system call logs Roopak et al [25] Prone to Syscall replacement attacks Xiao et al [31] Prone to Syscall reordering attacks Haridos et al [28] Syscall relationship is missing…”
Section: ML Classificationmentioning
confidence: 99%
See 1 more Smart Citation
“…By reviewing the literature, malware and its variant detection have achieved significant results on traditional models based on supervised learning. For example, Hashida et al 25 have extracted malware behavior features and used machine learning methods, including KNNs, naive Bayesian, decision trees, and support vector machines (SVM). In the process of malware feature extraction, many researchers also use PCA, ICA, LDA, and other methods to select features with better effects 26 .…”
Section: Related Workmentioning
confidence: 99%
“…They utilized 10-gram opcode features and achieved an F1-score of 98%. Manzil et al [35] introduced an innovative approach involving Huffman encoding to generate feature vectors for differentiating Android malware categories. They focused on classifying specific types of malware, such as riskware, adware, SMS malware, and banking malware.…”
Section: Related Workmentioning
confidence: 99%