Please use this identifier to cite or link to this item: https://idr.l1.nitk.ac.in/jspui/handle/123456789/11126
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSingh, A.K.
dc.contributor.authorJaidhar, C.D.
dc.contributor.authorKumara, M.A.A.
dc.date.accessioned2020-03-31T08:30:49Z-
dc.date.available2020-03-31T08:30:49Z-
dc.date.issued2019
dc.identifier.citationJournal of Computer Virology and Hacking Techniques, 2019, Vol.15, 3, pp.209-218en_US
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/11126-
dc.description.abstractAndroid-based smartphones are gaining popularity, due to its cost efficiency and various applications. These smartphones provide the full experience of a computing device to its user, and usually ends up being used as a personal computer. Since the Android operating system is open-source software, many contributors are adding to its development to make the interface more attractive and tweaking the performance. In order to gain more popularity, many refined versions are being offered to customers, whose feedback will enable it to be made even more powerful and user-friendly. However, this has attracted many malicious code-writers to gain anonymous access to the user s private data. Moreover, the malware causes an increase of resource consumption. To prevent this, various techniques are currently being used that include static analysis-based detection and dynamic analysis-based detection. But, due to the enhancement in Android malware code-writing techniques, some of these techniques are getting overwhelmed. Therefore, there is a need for an effective Android malware detection approach for which experimental studies were conducted in the present work using the static features of the Android applications such as Standard Permissions with Application Programming Interface (API) calls, Non-standard Permissions with API-calls, API-calls with Standard and Nonstandard Permissions. To select the prominent features, Feature Selection Techniques (FSTs) such as the BI-Normal Separation (BNS), Mutual Information (MI), Relevancy Score (RS), and the Kullback-Leibler (KL) were employed and their effectiveness was measured using the Linear-Support Vector Machine (L-SVM) classifier. It was observed that this classifier achieved Android malware detection accuracy of 99.6% for the combined features as recommended by the BI-Normal Separation FST. 2019, Springer-Verlag France SAS, part of Springer Nature.en_US
dc.titleExperimental analysis of Android malware detection based on combinations of permissions and API-callsen_US
dc.typeArticleen_US
Appears in Collections:1. Journal Articles

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.