2021
DOI: 10.1016/j.jisa.2021.102929
|View full text |Cite
|
Sign up to set email alerts
|

Android mobile malware detection using fuzzy AHP

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(11 citation statements)
references
References 30 publications
0
11
0
Order By: Relevance
“…Recursive Feature Elimination (RFE) Smmarwar et al [167] Binary Grey Wolf Optimization (BGWO) Arif et al [168] Information Gain Manzanares et al [169] Extracted permissions and other static and dynamic features to prepare a comprehensive dataset Bhat et al [170] Information Gain Deleted the features that are too infrequent and the ones that are present in almost the same number in both the datasets Elayan et al [171] Fed the extracted results to various machine classifiers Syrris et al [172] Removed the features having low variance Idrees et al [173] Information Gain Found the correlation between permissions and intents using Pearson correlation coefficient Rehman et al [174] Fed the results to various machine learning classifiers to find the cosine similarity between features Martin et al [175] Extracted to create a comprehensive and complete dataset, then fed the results to various machine learning classifiers for detection Navarro et al [ Clustering based k-means ++ algorithm to form separate clusters for each view which were combined later using stacking-based fusion method to learn the consensus malware detection pattern Zhu et al [190] Fed the results to RFbased machine learning classifier A.…”
Section: Techniques Usedmentioning
confidence: 99%
See 1 more Smart Citation
“…Recursive Feature Elimination (RFE) Smmarwar et al [167] Binary Grey Wolf Optimization (BGWO) Arif et al [168] Information Gain Manzanares et al [169] Extracted permissions and other static and dynamic features to prepare a comprehensive dataset Bhat et al [170] Information Gain Deleted the features that are too infrequent and the ones that are present in almost the same number in both the datasets Elayan et al [171] Fed the extracted results to various machine classifiers Syrris et al [172] Removed the features having low variance Idrees et al [173] Information Gain Found the correlation between permissions and intents using Pearson correlation coefficient Rehman et al [174] Fed the results to various machine learning classifiers to find the cosine similarity between features Martin et al [175] Extracted to create a comprehensive and complete dataset, then fed the results to various machine learning classifiers for detection Navarro et al [ Clustering based k-means ++ algorithm to form separate clusters for each view which were combined later using stacking-based fusion method to learn the consensus malware detection pattern Zhu et al [190] Fed the results to RFbased machine learning classifier A.…”
Section: Techniques Usedmentioning
confidence: 99%
“…Malware datasets used Smmarwar et al [167] CICInvesAndMal2019 Arif et al [168] AndroZoo, Drebin Manzanares et al [169] Drebin, AMD, VirusTotal, VirusShare Bhat et al [170] Virustotal, VirusShare, Drebin Elayan et al [171] CICAndMal2017 Syrris et al [172] Drebin Idrees et al [173] Contagiodump, Genome, Virus Total, theZoo, MalShare, VirusShare Rehman et al [174] M0DROID Martin et al [175] Koodous, AndroZoo Navarro et al [176] AndroZoo, [217] , VirusShare, AndroMalShare Milosevic et al [177] M0Droid Alzaylaee et al [178] McAfee Cai et al [179] AMD, Drebin Badhani et al [180] Andro-DumpSys, AndroZoo, Contagio , AndroMalShare , AMD, VirusTotal Hijawi et al [181] [218] Sheen et al [182] Genome Nisha et al [183] AndroZoo, VirusShare, Andro-MalShare, PRAGuard[226] Song et al [184] Not mentioned Zhang et al [185] Genome Yang et al [186] No malware Thiyagarajan et al [187] AndroZoo Qaisar et al [188] Android PRAGuard, Drebin, Open-source apps, Kharon, Androzoo, CICAAGM Appice et al [189] Alternative Chinese and Russian Markets, Android websites, malware forums, security blogs, Genome Zhu et al [190] VirusShare A. Altaher [191] Genome Su et al [192] Drebin, Genome, Contagio Mahindru et al [193] Genome , AndroMalShare, [218] Dehkordy et al [194] Drebin, AMD Nguyen et al [195] AMD, Drebin Taheri et al [196] Drebin, Contagio, Genome Mahesh et al [197] Private companies Firdaus et al [198] Drebin, Genome Shrivastava et al [199] Third-party applications Varsha et al [20...…”
Section: Related Workmentioning
confidence: 99%
“…A fuzzy logic framework is designed to detect the malwares [16]. Analytical hierarchy process (AHP) fuzzy model achieves 90.54% based on the info gain value evaluation parameter.…”
Section: Introductionmentioning
confidence: 99%
“…The traditional security protection of power mobile terminals mainly carries out security monitoring and protection through Firewall, Flow Monitoring, WAF and other security devices 4 , which lacks a special security protection system for power mobile terminals 5 . At the same time, common security assessment methods at home and abroad at this stage mainly include: 1) Security risk assessment based on hierarchical method is a decision analysis method combining qualitative and quantitative methods 6 , for example, Arif et al used the fuzzy AHP method to detect Android malware 7 ; Chen et al used AHP method to assess the security risk of power mobile terminals 8 ; 2) The security risk assessment based on information fusion is mainly realized by fusing the security information collected by multi-sensor, Zhang et al realized the assessment of network security situation by collecting and integrating multi-source heterogeneous data 9 ; Li et al put forward an evidence theory based on "D-S", and used SVM, LR and KNN as multi-source information fusion sensors to achieve host security analysis 10 ; 3) Modeling based security risk assessment, which described the system behavior and state by building a security model, and gave an overall assessment of security risk based on the model. Such as Li et al proposes a network security situation assessment method based on attack tree, which realizes the assessment of Internet of Vehicles security 11 .…”
Section: Introductionmentioning
confidence: 99%