2017
DOI: 10.1155/2017/3284080
|View full text |Cite
|
Sign up to set email alerts
|

Computing Adaptive Feature Weights with PSO to Improve Android Malware Detection

Abstract: Android malware detection is a complex and crucial issue. In this paper, we propose a malware detection model using a support vector machine (SVM) method based on feature weights that are computed by information gain (IG) and particle swarm optimization (PSO) algorithms. The IG weights are evaluated based on the relevance between features and class labels, and the PSO weights are adaptively calculated to result in the best fitness (the performance of the SVM classification model). Moreover, to overcome the def… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 35 publications
0
12
0
Order By: Relevance
“…Several ensemble learning-based detection solutions, such as those of Rhode, Burnap [28], Homayoun, Dehghantanha [40], were proposed to detect the ransomware early. The idea is that by combining decisions of several weak classifiers, the ensemble can make more accuracy detection [28,45,[92][93][94][95]. This is attributed to the complementary nature of the ensemble's base classifiers, which allows the introspection of the versatility of the dataset that contributes to increase the detection accuracy [45][46][47][48].…”
Section: Detection Techniquesmentioning
confidence: 99%
“…Several ensemble learning-based detection solutions, such as those of Rhode, Burnap [28], Homayoun, Dehghantanha [40], were proposed to detect the ransomware early. The idea is that by combining decisions of several weak classifiers, the ensemble can make more accuracy detection [28,45,[92][93][94][95]. This is attributed to the complementary nature of the ensemble's base classifiers, which allows the introspection of the versatility of the dataset that contributes to increase the detection accuracy [45][46][47][48].…”
Section: Detection Techniquesmentioning
confidence: 99%
“…If the expressions and constraints of an application are in this rule library, this application will be considered as a malicious application. For example, to reduce the high false- [15], [16], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57], [58], [59], [60], [61], [62], [63], [64], [94], [95], [98], [99], [100], [101], [102], [105], [109], [111],…”
Section: ) Publication Sourcementioning
confidence: 99%
“…For event risk value, calculate information leakage risk coefficient according to weight. Reference [9][10][11][12] pointed out that machine learning has been widely applied in the fields of healthcare, cybersecurity, etc. due to its powerful data mining capabilities, where SVM is one of the most popular machine learning algorithms; therefore use SVM algorithm to divide information leakage risk coefficient and get a final evaluation.…”
Section: Principles Of Intelligent Detection Systemmentioning
confidence: 99%