2022
DOI: 10.3390/sym14040718
|View full text |Cite
|
Sign up to set email alerts
|

Permissions-Based Detection of Android Malware Using Machine Learning

Abstract: Malware applications (Apps) targeting mobile devices are widespread, and compromise the sensitive and private information stored on the devices. This is due to the asymmetry between informative permissions and irrelevant and redundant permissions for benign Apps. It also depends on the characteristics of the Android platform, such as adopting an open-source policy, supporting unofficial App stores, and the great tolerance for App verification; therefore the Android platform is destined to face such malicious i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(15 citation statements)
references
References 28 publications
0
8
0
Order By: Relevance
“…These permissions included permission rate, type, and the sizes of the applications to undertake static analysis and explicitly grasp each application's behavior. After identifying the list of permissions, filtering, finalizing, and retrieving the essential features will be used to specify the most important permissions to differentiate malicious and benign apps [217]. Permissions are assigned one of the four protection levels, which describe the potential risks they may entail and impose various install-time approval procedures.…”
Section: Discussionmentioning
confidence: 99%
“…These permissions included permission rate, type, and the sizes of the applications to undertake static analysis and explicitly grasp each application's behavior. After identifying the list of permissions, filtering, finalizing, and retrieving the essential features will be used to specify the most important permissions to differentiate malicious and benign apps [217]. Permissions are assigned one of the four protection levels, which describe the potential risks they may entail and impose various install-time approval procedures.…”
Section: Discussionmentioning
confidence: 99%
“…Some of them are multinomial naïve Bayes (MNB), decision tree ID3 (DTID3), decision tree C45 (DTC45), decision tree C50 (DTC50), neural network (NN), genetic algorithm (GA), and analytical hierarchy process (AHP). Most of each variable is discretized using the same membership function [3,5,28,29]. However, some combine several fuzzy membership functions [9,10,12].…”
Section: Related Workmentioning
confidence: 99%
“…The naïve Bayes method is the usual classification method with a satisfactory performance [27,28], especially for image classification [14,29,30]. If the predictor variables have a continuous scale and meet the assumption of a Gaussian distribution, this method is known as Gaussian naïve Bayes.…”
Section: Introductionmentioning
confidence: 99%
“…Naive users,who unfortunately are in the majority will always fall victims by not strictly observing these guidelines.The biggest traction in recent years has been achieved by new android based malware detection approaches based on machine learning techniques [14], such as ensemble clustering methods. Akbar et al [15], recently presented a permissions-based malware detection method that assesses an app's malice based on the use of suspecious permissions. The authors employed a multilevel technique by extracting the important features like permissions from over 10000 android apps.To classify the applications into their malicious or legitimate categories, the researchers used a variety of machine learning algorithms,including Support Vector Machine,Random Forest, Rotation Forest, and Naïve Bayes classifiers.…”
Section: Related Workmentioning
confidence: 99%