2018
DOI: 10.1109/access.2018.2883975
|View full text |Cite
|
Sign up to set email alerts
|

Android Malware Permission-Based Multi-Class Classification Using Extremely Randomized Trees

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 39 publications
(24 citation statements)
references
References 30 publications
0
24
0
Order By: Relevance
“…In this research the problem of overlapping [16], [40] in the domain of multi-class classification [1], [42] is addressed. We suggest that using OVO [46] can improve the performance of base classifiers when treating problems with overlapping.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this research the problem of overlapping [16], [40] in the domain of multi-class classification [1], [42] is addressed. We suggest that using OVO [46] can improve the performance of base classifiers when treating problems with overlapping.…”
Section: Discussionmentioning
confidence: 99%
“…Multi-class data [1], [42] are frequent in real-world tasks, being a generalization of data with only two classes (binary problems). Multi-class classification data have been traditionally addressed following two different approaches [24]: 1) Algorithm level approaches.…”
Section: Binary Decomposition Strategies For Datasets With Multipmentioning
confidence: 99%
“…In addition, other malware use an obfuscation technique or encrypted methods which cannot be read or decrypted unless the app is executed. A set of papers [28][29][30][31][32][33][34][35][36][37][38][39]42,[46][47][48]50,52,53,[55][56][57]59,62,63,[65][66][67] used static analysis. Details on the static features used by the papers were discussed in Section 4, Features.…”
Section: Static Analysismentioning
confidence: 99%
“…In [39], the authors use three machine learning techniques: standard classifier such as SVM, ensemble classifier, and Neural Network to classify malware into families. In [48], Alswaina et al use two models to perform familial classification. The authors use the binary representation of the features and weighted importance.…”
Section: Model-basedmentioning
confidence: 99%
“…The work [39] addressed the concept drifting problem in malware detection, which bridged a fundamental research gap when dealing with evolving malicious software. Alswaina and Elleithy [41] adopted machine learning to analyze and identify the permissions requested by malware. The Extremely Randomized Trees were used to identify a small number of permissions that could be used to attribute the malware into the malware families.…”
Section: B Android Malware Family Classificationmentioning
confidence: 99%