2023
DOI: 10.1109/access.2023.3244656
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Machine Learning Approach for Android Malware Detection Based on the Co-Existence of Features

Abstract: This paper proposes a machine learning model based on the co-existence of static features for Android malware detection. The proposed model assumes that Android malware requests an abnormal set of co-existed permissions and APIs in comparing to those requested by benign applications. To prove this assumption, the paper created a new dataset of co-existed permissions and API calls at different levels of combinations, which are the second level, the third level, the fourth level and the fifth level. The extracte… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…In this method, each decision tree is created according to the dependency relationships of the data samples [38]. It uses the averaging method to increase the accuracy and prevent overfitting [39].…”
Section: Classification Algorithmsmentioning
confidence: 99%
“…In this method, each decision tree is created according to the dependency relationships of the data samples [38]. It uses the averaging method to increase the accuracy and prevent overfitting [39].…”
Section: Classification Algorithmsmentioning
confidence: 99%
“…The malware is commonly determined by four main groups such as hardware, kernel, hardware abstraction layer as well as application-based attacks [6]. This malware causes a number of material as well as non-material damages named unauthorized action on behalf of users, collection of significant information from users, damaging the device hardware [7].…”
Section: Introductionmentioning
confidence: 99%
“…Several studies have been carried out to explore the use of DL in AM detection. In [4], the DL-based methods based on permission patterns and API calls were developed for AM detection. In the same way, the research work in [5] used DL approaches to evaluate static and dynamic characteristics of Android applications and attained high identification accuracy.…”
Section: Introductionmentioning
confidence: 99%