2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184) 2020
DOI: 10.1109/icoei48184.2020.9142929
|View full text |Cite
|
Sign up to set email alerts
|

Feature Selection and Evaluation of Permission-based Android Malware Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…As we can see, close to 48% of the total research works used in this review based their approach on either ML or DL classifiers/techniques [110]- [115]. Either they fed the extracted features directly to the machine learning classifiers to be dealt with or used techniques like gain ratio, correlation coefficient [29], mutual information, relief [36] Fig. 1: Statistics depicting the most commonly used techniques to build an Android malware analysis/detection system considering permissions etc., to compute the feature score.…”
Section: Techniques Usedmentioning
confidence: 92%
See 2 more Smart Citations
“…As we can see, close to 48% of the total research works used in this review based their approach on either ML or DL classifiers/techniques [110]- [115]. Either they fed the extracted features directly to the machine learning classifiers to be dealt with or used techniques like gain ratio, correlation coefficient [29], mutual information, relief [36] Fig. 1: Statistics depicting the most commonly used techniques to build an Android malware analysis/detection system considering permissions etc., to compute the feature score.…”
Section: Techniques Usedmentioning
confidence: 92%
“…Monitored the permission usage within the application and with the system Li et al [20] Ranking based on the frequency of permissions being requested. Sahin et al [21] Linear Regression Talha et al [22] Combined Risk score calculated for each app Varma et al [23] Used permissions as features to study the performance of ML algorithms Mahindru et al [24] Discarded the ones not installed or starting at launching stage Dogru et al [25] Permission groups score calculated, to sum up an app's Risk Score Rathore et al [26] Variance threshold, autoencoders, and PCA Shang et al [27] Reduced the permission set with Pearson's Correlation Coefficient Tchakounte et al [28] Similarity score based on sequence alignment Ju et al [16] Manual pattern recognition to existing malware permissions patterns Ilham et al [29] Gain Ratio, Information Gain, Correlation Coefficient, CFS subset Evaluator Sahin et al [30] Relevance Frequency Angelo et al [31] Mapped the permissions on the x-y plane using their corresponding protection level Xiong et al [32] Used unique and common permissions patterns from both datasets as weak Classifier Lu et al [33] Improved RF algorithms along with introducing fuzzy sets of samples Kavitha et al [34] PCA and Sequential Forward selection, Limiting the permissions by accepting or denying each permission separately according to Dangerous level E. Amer [35] Developed an ensemble comprising multiple classifiers Chakravarty et al [36] Information Gain, Relief, Gain Ratio Pondugula et al [37] Deep Neural Network model Sahal et al [38] Ranking based on permissions class frequency Tuan Mat et al [39] Used Bayes classifier after optimising features using Chi-Square Test Wang et al [40] Association rule Mining, PCA , Deep Cross Network Park et al [41] Reduced features by removing built-in, custom, dangerous, and permissions that are used at least once Liang et al [42] Generated k maps for permission combinations based on their usage Enck et al [14] Presented analysis of the newly launched Android OS in 2009 Enck et al [17] Defined rules based upon dangerous level and possible negative impact Wang et al…”
Section: Techniques Usedmentioning
confidence: 99%
See 1 more Smart Citation
“…Many researchers have proposed numerous feature selection techniques to address this issue. Chakravarty et al [22] compared three feature selection methods: Gain ratio, Information Gain, and Relief. The proposed method uses feature selection on four different classification algorithms, and the results showed that the gain ratio obtained higher performance in most classification algorithms and achieved 94.47% accuracy.…”
Section: Feature Selectionmentioning
confidence: 99%
“…The feature selection process involves identifying and removing less significant features from a dataset to decrease the complexity of machine learning and increase the model accuracy. Previous research on malware detection has proved that the gain ratio performs better than other feature selection methods [22]. Thus, this research also uses the gain ratio method in the Android malware detection model as a feature selection method.…”
Section: Gain Ratiomentioning
confidence: 99%