2021
DOI: 10.1007/s00521-021-05875-1
|View full text |Cite
|
Sign up to set email alerts
|

A novel permission-based Android malware detection system using feature selection based on linear regression

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 33 publications
(14 citation statements)
references
References 34 publications
0
14
0
Order By: Relevance
“…Until today, many static analysis researchers depends on permissions ( Arora, Peddoju & Conti, 2019 ; Dharmalingam & Palanisamy, 2021 ; Li et al, 2018 ; Şahin et al, 2021 ); however, many are relying on API calls ( Alazab et al, 2020 ; Jung et al, 2018 ; Maiorca et al, 2017 ; Mirzaei et al, 2019 ; Pektaş & Acarman, 2020 ; Tiwari & Shukla, 2018 ; Zhang et al, 2020 ; Zhang, Breitinger & Baggili, 2016 ; Zou et al, 2021 ) and deep code analysis and other types of features as discussed earlier in Android evasion detection frameworks section. Many of examined researches ignored the evasion techniques evaluation.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Until today, many static analysis researchers depends on permissions ( Arora, Peddoju & Conti, 2019 ; Dharmalingam & Palanisamy, 2021 ; Li et al, 2018 ; Şahin et al, 2021 ); however, many are relying on API calls ( Alazab et al, 2020 ; Jung et al, 2018 ; Maiorca et al, 2017 ; Mirzaei et al, 2019 ; Pektaş & Acarman, 2020 ; Tiwari & Shukla, 2018 ; Zhang et al, 2020 ; Zhang, Breitinger & Baggili, 2016 ; Zou et al, 2021 ) and deep code analysis and other types of features as discussed earlier in Android evasion detection frameworks section. Many of examined researches ignored the evasion techniques evaluation.…”
Section: Discussionmentioning
confidence: 99%
“… Permission-based: APK Auditor ( Talha, Alper & Aydin, 2015 ) is a static model that leverages permission-based detection castoff decompressing the APK package; it extracts the malicious symptoms using permission and signature matching analysis. Likewise, Triggerscope ( Fratantonio et al, 2016 ) uses permissions characteristics as an input to classify the application using different machine learning algorithms ( Abdulla & Altaher, 2015 ; Alazab et al, 2020 ; Arora, Peddoju & Conti, 2019 ; Dharmalingam & Palanisamy, 2021 ; Fang, Han & Li, 2014 ; Glodek & Harang, 2013 ; Li et al, 2018 ; Niazi et al, 2015 ; Şahin et al, 2021 ; Shalaginov & Franke, 2014 ; Talha, Alper & Aydin, 2015 ; Tiwari & Shukla, 2018 ). Source code based Analysis: Arp et al (2015) extracts features from the application’s Androidmanifest file and source code ; it scrutinizes the code by listing the native calls , API calls , and URL addresses .…”
Section: Evasion Techniquesmentioning
confidence: 99%
“…Şahin et al presented, in 2021, a machine-learning based malware detection system that utilizes deep neural networks [21]. The proposed system relies on features extracted from the application permissions.…”
Section: B Machine Learning-based Malware Detectionmentioning
confidence: 99%
“…The proposed work in [70] checked the possibility of using reduced dimension vector generating for malware detection. Based on that, malware detection using ML models with permission-based static analysis was performed.…”
Section: Manifest Based Static Analysis With MLmentioning
confidence: 99%