2018
DOI: 10.1155/2018/5749481
|View full text |Cite
|
Sign up to set email alerts
|

Android Malware Characterization Using Metadata and Machine Learning Techniques

Abstract: Android malware has emerged as a consequence of the increasing popularity of smartphones and tablets. While most previous work focuses on inherent characteristics of Android apps to detect malware, this study analyses indirect features and metadata to identify patterns in malware applications. Our experiments show the following: (1) the permissions used by an application offer only moderate performance results; (2) other features publicly available at Android markets are more relevant in detecting malware, suc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(16 citation statements)
references
References 23 publications
0
16
0
Order By: Relevance
“…This method is not affected by reinforcement and confusion, but a high accuracy can not be got due to the small difference in permission features. Martín et al [9] verified this. To improve the accuracy of classification, multiple static features are integrated.…”
Section: Introductionmentioning
confidence: 76%
“…This method is not affected by reinforcement and confusion, but a high accuracy can not be got due to the small difference in permission features. Martín et al [9] verified this. To improve the accuracy of classification, multiple static features are integrated.…”
Section: Introductionmentioning
confidence: 76%
“…If the expressions and constraints of an application are in this rule library, this application will be considered as a malicious application. For example, to reduce the high false- [15], [16], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57], [58], [59], [60], [61], [62], [63], [64], [94], [95], [98], [99], [100], [101], [102], [105], [109], [111],…”
Section: ) Publication Sourcementioning
confidence: 99%
“…To find the most suitable feature reduction technique, it is noticed that some studies make the comparison among different techniques. For example, to find a suitable feature reduction techniques, Martín et al [45] compare the performance of IG, Chi-square (χ 2 ), and gain ratio (GR). RQ2.3: Only a part of the studies adopt feature reduction techniques, and IG accounts for the largest proportion in the off-the-shelf feature reduction techniques.…”
Section: Rq23mentioning
confidence: 99%
“…The research focused on malware detection, such as application developers and certificate issuers published on the Android Market. They used logistic regression (LR), SVM, and RF to construct a small, efficient classifier that could detect malware applications early in the sandbox [45]. W. Niu et al proposed a method to detect the advanced persistent threat (APT) malicious code command and control (C and C) domain with high accuracy by analyzing the mobile DNS log.…”
Section: Limitation Of Mobile Malware Detectionmentioning
confidence: 99%