32
Views
0
CrossRef citations to date
0
Altmetric
Research Article

A study of feature selection methods for android malware detection

&
Pages 2111-2120 | Received 01 Sep 2022, Published online: 16 Dec 2022

References

  • Chen, Sen, et al. “Are mobile banking apps secure? What can be improved?.” Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 2018.
  • Keelery, S. 2021. Number of mobile users in India. https://www.statista.com/statistics/558610/number-of-mobile-internet-user-in-india (accessed May 14, 2022).
  • Laricchia, F. 2022. Worldwide market share of mobile operating systems worldwide from Jan 2012 to June 2021. https://www.statista.com/statistics/272698/global-market-share-held-by-mobile-operating-systems-since-2009/. (accessed May 14, 2022)
  • Sawaisarje, SnehalKumar K., Vinod K. Pachghare, and Deepak D. Kshirsagar. “Malware detection based on string length histogram using machine learning.” 2018 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT). IEEE, 2018.
  • Henry, J. 2021. Banking Trojan malware targets 300000 android users. https://www.techtimes.com/articles/268704/20211130/banking-trojan-malware-hits-over-300-000-android-users-list.htm. (accessed May15, 2022).
  • Shishkova, T. 2021. Mobile malware evolution 2021. https://securelist.com/mobile-malware-evolution-2021/105876/ .(accessed May 15, 2022).
  • Altaher, Altyeb. “Classification of android malware applications using feature selection and classification algorithms.” VAWKUM Transactions on Computer Sciences 10.1 (2016): 1-5. doi: 10.21015/vtcs.v10i1.412
  • Singh, Latika, and Markus Hofmann. “Dynamic behavior analysis of android applications for malware detection.” 2017 International Conference on Intelligent Communication and Computational Techniques (ICCT). IEEE, 2017.
  • Nivaashini, M., R. S. Soundariya, H. Vidhya Shri, and P. Thangaraj. “Comparative Analysis of Feature Selection Methods and Machine Learning Algorithms in Permission based Android Malware Detection.” In 2018 International Conference on Intelligent Computing and Communication for Smart World (I2C2SW), pp. 72-77. IEEE, 2018.
  • Chakravarty, Sujata. “Feature selection and evaluation of permission-based Android malware detection.” In 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184), pp. 795-799. IEEE, 2020.
  • Shao, Ke, Qiang Xiong, and Zhiming Cai. “FB2Droid: A Novel Malware Family-Based Bagging Algorithm for Android Malware Detection.” Security and Communication Networks 2021 (2021).
  • Kouliaridis, Vasileios, Georgios Kambourakis, and Tao Peng. “Feature importance in android malware detection.” 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2020.
  • Mat, Sharfah Ratibah Tuan, et al. “A Bayesian probability model for Android malware detection.” ICT Express (2021).
  • Al Sarah, Neamat, et al. “An Efficient Android Malware Prediction Using Ensemble machine learning algorithms.” Procedia Computer Science 191 (2021): 184-191. doi: 10.1016/j.procs.2021.07.023
  • Xiao, Xi, et al. “Android malware detection based on system call sequences and LSTM.” Multimedia Tools and Applications 78.4 (2019): 3979-3999. doi: 10.1007/s11042-017-5104-0
  • Kinkead, M., Millar, S., McLaughlin, N., and O’Kane, P. (2021). “Towards explainable CNNs for Android malware detection”. Procedia Computer Science, 184, 959-965. doi: 10.1016/j.procs.2021.03.118
  • Elayan, Omar N., and Ahmad M. Mustafa. “Android malware detection using deep learning.” Procedia Computer Science 184 (2021): 847-852. doi: 10.1016/j.procs.2021.03.106
  • Almahmoud, Mothanna, Dalia Alzúbi, and Qussai Yaseen. “ReDroidDet: Android malware detection based on recurrent neural network.” Procedia Computer Science 184 (2021): 841-846. doi: 10.1016/j.procs.2021.03.105
  • Mahdavifar, Samaneh, et al. “Dynamic android malware category classification using semi-supervised deep learning.” 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech). IEEE, 2020.
  • Kshirsagar, Deepak, and Sandeep Kumar. “An ensemble feature reduction method for web-attack detection.” Journal of Discrete Mathematical Sciences and Cryptography 23, no. 1 (2020): 283-291. doi: 10.1080/09720529.2020.1721861
  • Kshirsagar, Deepak, and Sandeep Kumar. “Towards an intrusion detection system for detecting web attacks based on an ensemble of filter feature selection techniques.” Cyber-Physical Systems (2022): 1-16. doi: 10.1080/23335777.2021.2023651
  • Agrawal, Pooja V., and Deepak D. Kshirsagar. “Information Gain-based Feature Selection Method in Malware Detection for MalDroid2020.” In 2022 International Conference on Smart Technologies and Systems for Next Generation Computing (ICSTSN), pp. 1-5. IEEE, 2022.
  • Yask, and B. Suresh Kumar. “Construct the filter for malware detection in distributed control system.” Journal of Information and Optimization Sciences 40.5 (2019): 1155-1166. doi: 10.1080/02522667.2019.1642433
  • Rahul, et al. “Analysis of machine learning models for malware detection.” Journal of Discrete Mathematical Sciences and Cryptography 23.2 (2020): 395-407. doi: 10.1080/09720529.2020.1721870
  • Kaur, Gurdip, Renu Dhir, and Maninder Singh. “A stress testing web-based framework for automated malware analysis.” Journal of Information and Optimization Sciences 38.6 (2017): 937-944. doi: 10.1080/02522667.2017.1372139

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.