2014
DOI: 10.1007/s00500-014-1511-6
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of machine learning classifiers for mobile malware detection

Abstract: Mobile devices have become a significant part of people's lives, leading to an increasing number of users involved with such technology. The rising number of users invites hackers to generate malicious applications. Besides, the security of sensitive data available on mobile devices is taken lightly. Relying on currently developed approaches is not sufficient, given that intelligent malware keeps modifying rapidly and as a result becomes more difficult to detect. In this paper, we propose an alternative soluti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
126
0
2

Year Published

2016
2016
2023
2023

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 322 publications
(137 citation statements)
references
References 48 publications
0
126
0
2
Order By: Relevance
“…Narudin et al [84] evaluates logical-based, perceptron-based, static-based and instance-based classifiers evaluating in mobile applications. Arshad et al [85] surveys static based approaches (i.e.…”
Section: Platforms and Iot Malwarementioning
confidence: 99%
“…Narudin et al [84] evaluates logical-based, perceptron-based, static-based and instance-based classifiers evaluating in mobile applications. Arshad et al [85] surveys static based approaches (i.e.…”
Section: Platforms and Iot Malwarementioning
confidence: 99%
“…More recently, new malware such as the BrainTest [3], have succeeded in infecting over half a million Android devices, targeting Google Play in particular. Many recent studies have resulted in a number of automated approaches to tackle the spread of malware [4] [5] [6] [7]. Static analysis techniques, which have traditionally been used for detecting malware targeting desktop computers, have recently gained popularity as effective measures for the protection of mobile applications [8].…”
Section: Introductionmentioning
confidence: 99%
“…They enable an application to create windows that can be shown on top of other applications and even execute tasks on them, these abilities made them an extremely attractive target for malware developers to perform tapjacking attacks. A significantly sophisticated new form of Android ransomware/Android.Lockdroid.E is detected [4], this variant of ransomware malware employs the accessibility tapjacking method to pose a real threat for more than 67% of Android devices. Table 2 above shows the testing and training RMSE for both ANFIS and PSO-ANFIS using the features selected by the proposed dual-stage method based on the five-fold crossvalidation.…”
Section: Experiments and Results Discussionmentioning
confidence: 99%
“…Detecting the huge number of Android malware and isolating them from application markets is potential and great challenging issue. Very recently in 2016, a significantly sophisticated new form of Android ransomware/Android.Lockdroid.E is detected by Symantec, this variant of ransomware malware employs the accessibility tapjacking method to pose a real threat for more than 67% of Android devices [4].…”
Section: Introductionmentioning
confidence: 99%