2020
DOI: 10.1049/iet-ifs.2019.0418
|View full text |Cite
|
Sign up to set email alerts
|

Improved real‐time permission based malware detection and clustering approach using model independent pruning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 22 publications
0
8
0
Order By: Relevance
“…Android applications are installed on mobile devices after approval from the users. Since permission is the first obstacle for cyber hackers to reach their malicious targets, many researchers ( Sinan Arslan, Alper Doğru & Barışçı, 2019 ; Shehata et al, 2020 ; Thiyagarajan, Akash & Murugan, 2020 ) have carried out permission-based analysis studies. Arp et al (2014) evaluated the permissions, API calls, hardware components, and intents in the application manifest file together in their study in 2014.…”
Section: Methodsmentioning
confidence: 99%
“…Android applications are installed on mobile devices after approval from the users. Since permission is the first obstacle for cyber hackers to reach their malicious targets, many researchers ( Sinan Arslan, Alper Doğru & Barışçı, 2019 ; Shehata et al, 2020 ; Thiyagarajan, Akash & Murugan, 2020 ) have carried out permission-based analysis studies. Arp et al (2014) evaluated the permissions, API calls, hardware components, and intents in the application manifest file together in their study in 2014.…”
Section: Methodsmentioning
confidence: 99%
“…According to the Equation 3, the process of calculating the accuracy of the model is by dividing the correct prediction ratio by the total percentage of the number of samples:True positive (TP) , True negative(TN),False Positive (FP) and False Negative (FN) [70].…”
Section: Accuracymentioning
confidence: 99%
“…The Model has outperformed other classifiers, i.e., K-NN (87.90%), NB (91.80%), RF (89.10%), and j48 (90.09%). Thiyagarajan et al[70] utilized The Chai-square technique in malware detection to reduce the number of permissions and enhance efficiency. In addition, it reduced the false rate in the clustering process as well.…”
mentioning
confidence: 99%
“…The first level was calculated on the opcode sequence and the second used method block sequences to learn and detect malicious software. To reduce the complexity of the model, Thiyagarajan et al [22] developed a preprocessing module that contains five different data reduction techniques, which reduced 133 permissions information into 10-dimensional vector information, and identified malicious applications by training DTs. The accuracy of the method reached 94.3%.Other deep learning algorithms are also favoured by many researchers [16,23,24].…”
Section: Related Workmentioning
confidence: 99%