DocumentCode
229368
Title
The analysis of feature selection methods and classification algorithms in permission based Android malware detection
Author
Pehlivan, Ugur ; Baltaci, Nuray ; Acarturk, Cengiz ; Baykal, Nazife
Author_Institution
Cyber Defense & Security Lab. of METU-COMODO, Middle East Tech. Univ. (METU), Ankara, Turkey
fYear
2014
fDate
9-12 Dec. 2014
Firstpage
1
Lastpage
8
Abstract
Android mobile devices have reached a widespread use since the past decade, thus leading to an increase in the number and variety of applications on the market. However, from the perspective of information security, the user control of sensitive information has been shadowed by the fast development and rich variety of the applications. In the recent state of the art, users are subject to responding numerous requests for permission about using their private data to be able run an application. The awareness of the user about data protection and its relationship to permission requests is crucial for protecting the user against malicious software. Nevertheless, the slow adaptation of users to novel technologies suggests the need for developing automatic tools for detecting malicious software. In the present study, we analyze two major aspects of permission-based malware detection in Android applications: Feature selection methods and classification algorithms. Within the framework of the assumptions specified for the analysis and the data used for the analysis, our findings reveal a higher performance for the Random Forest and J48 decision tree classification algorithms for most of the selected feature selection methods.
Keywords
decision trees; feature selection; invasive software; mobile computing; pattern classification; smart phones; J48 decision tree classification algorithms; data analysis; feature selection methods; permission based Android malware detection; random forest; Androids; Classification algorithms; Feature extraction; Humanoid robots; Malware; Smart phones; android application; classification; cyber security; feature selection; machine learning; malware detection; static analysis;
fLanguage
English
Publisher
ieee
Conference_Titel
Computational Intelligence in Cyber Security (CICS), 2014 IEEE Symposium on
Conference_Location
Orlando, FL
Type
conf
DOI
10.1109/CICYBS.2014.7013371
Filename
7013371
Link To Document