2016 3rd International Conference on Information Science and Control Engineering (ICISCE) 2016
DOI: 10.1109/icisce.2016.161
|View full text |Cite
|
Sign up to set email alerts
|

Ultra-Lightweight Malware Detection of Android Using 2-Level Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0
1

Year Published

2018
2018
2019
2019

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 16 publications
0
3
0
1
Order By: Relevance
“…After that, several machine learning techniques such as AdaBoost, Random Forest, SVM, K-NN, Logistic Regression, Naive Bayes, Decision Tree Classifiers and Deep Learning have been adopted to classify an Android application as malware or benign. In [111], an Android malware detection method that combines 2-level machine learning with static analysis techniques has been proposed to optimize malware detection. In the first level, the Support Vector Machine has been used, while three different algorithms have been adopted in the second level (i.e.…”
Section: Detection Phasementioning
confidence: 99%
See 1 more Smart Citation
“…After that, several machine learning techniques such as AdaBoost, Random Forest, SVM, K-NN, Logistic Regression, Naive Bayes, Decision Tree Classifiers and Deep Learning have been adopted to classify an Android application as malware or benign. In [111], an Android malware detection method that combines 2-level machine learning with static analysis techniques has been proposed to optimize malware detection. In the first level, the Support Vector Machine has been used, while three different algorithms have been adopted in the second level (i.e.…”
Section: Detection Phasementioning
confidence: 99%
“…This algorithm depends on calculating the entropy values of the features and selecting the highest gain features to be used in training the classification model. This algorithm is the most used algorithm in the studied works, such as in [48,95,111,113,114]. In [119], the features have been ranked using mutual information method to select the top 10, 15, 20 and 25 features.…”
Section: Feature Selection Phasementioning
confidence: 99%
“…No total foram definidas 36 chamadas de API sensíveis e 60 permissões a partir da análise de 1954 aplicações que foram obtidas de [Lashkari et al 2018]. Algumas características selecionadas também foram utilizadas em outros trabalhos relacionados à detecção de malware em Android [Yuan et al 2016], [Feldman et al 2015], [Ma et al 2016].…”
Section: Extração De Característicasunclassified
“…Since applications added to Google Play Market in the benign dataset did not go through a detailed analysis process to determine whether the applications in the benign data set were safe or not, the safety was checked using the VirusTotal API [38]. VirusTotal was used in the studies of AndroDialysis [20], Kang et al [39], Ma et al [40] and ICCDetector [41], which are available in the literature to ensure the safety of the applications that are used in benign data sets. 158 applications were found to be malicious by at least one antivirus program, namely the VirusTotal scanning, to sustain safer applications in the data set.…”
Section: Web-based Android Malicious Software Detection and Classificmentioning
confidence: 99%