Android恶意软件检测环境下改进的二进制猫头鹰特征选择

ID:38925

大小:0.45 MB

页数:19页

时间:2023-03-14

金币:2

上传者:战必胜
Citation: Alazzam, H.; Al-Adwan, A.;
Abualghanam, O.; Alhenawi, E.;
Alsmady, A. An Improved Binary
Owl Feature Selection in the Context
of Android Malware Detection.
Computers 2022, 11, 173. https://
doi.org/10.3390/computers11120173
Academic Editors: Phivos Mylonas,
Katia Lida Kermanidis and Manolis
Maragoudakis
Received: 7 October 2022
Accepted: 22 November 2022
Published: 30 November 2022
Publishers Note: MDPI stays neutral
with regard to jurisdictional claims in
published maps and institutional affil-
iations.
Copyright: © 2022 by the authors.
Licensee MDPI, Basel, Switzerland.
This article is an open access article
distributed under the terms and
conditions of the Creative Commons
Attribution (CC BY) license (https://
creativecommons.org/licenses/by/
4.0/).
computers
Article
An Improved Binary Owl Feature Selection in the Context of
Android Malware Detection
Hadeel Alazzam
1,
* , Aryaf Al-Adwan
2,
*, Orieb Abualghanam
3,
* , Esra’a Alhenawi
4
and Abdulsalam Alsmady
5
1
Department of Intelligent Systems, Al-Balqa Applied University, Al-Salt 19117, Jordan
2
Department of Autonomous Systems, Al-Balqa Applied University, Al-Salt 19117, Jordan
3
Department of Computer Science, University of Jordan, Amman 11942, Jordan
4
Department of Software Engineering, Al-Ahliyya Amman University, Amman 19328, Jordan
5
Department of Computer Engineering, Jordan University of Science and Technology, Irbid 22110, Jordan
* Correspondence: hadeel.alazzam@bau.edu.jo (H.A.); aryaf_aladwan@bau.edu.jo (A.A.-A.);
o.abualganam@ju.edu.jo (O.A.)
Abstract:
Recently, the proliferation of smartphones, tablets, and smartwatches has raised security
concerns from researchers. Android-based mobile devices are considered a dominant operating
system. The open-source nature of this platform makes it a good target for malware attacks that
result in both data exfiltration and property loss. To handle the security issues of mobile malware
attacks, researchers proposed novel algorithms and detection approaches. However, there is no
standard dataset used by researchers to make a fair evaluation. Most of the research datasets were
collected from the Play Store or collected randomly from public datasets such as the DREBIN dataset.
In this paper, a wrapper-based approach for Android malware detection has been proposed. The
proposed wrapper consists of a newly modified binary Owl optimizer and a random forest classifier.
The proposed approach was evaluated using standard data splits given by the DREBIN dataset in
terms of accuracy, precision, recall, false-positive rate, and F1-score. The proposed approach reaches
98.84% and 86.34% for accuracy and F-score, respectively. Furthermore, it outperforms several related
approaches from the literature in terms of accuracy, precision, and recall.
Keywords: Android malware detection; binary owl optimizer; DREBIN dataset
1. Introduction
Malware is the abbreviation of “Malicious Software”, and refers to unwanted types
of software regardless of its type, intent, or distribution method (e.g., virus, Trojan horse,
worms, spyware, etc.) [
1
]. The Malware infects systems with the intent to gain access to
sensitive information. Malware detection is the process of detecting malware on a host
device, or the process of determining whether a program is malicious or benign. Malware
continues to be a problematic security issue, especially in the software and cyber-security
fields. Until the advent of smartphones, malware was only significantly found in computers.
However, recent technological advancements have seen malware become conspicuous in
smartphones and mobile devices that run on the Android platform. The fact that Android
is the most popular and widely used platform for smartphones and mobile devices renders
it an ideal target for malware attacks. Nonetheless, there have been significant efforts
from the corresponding stakeholders aimed at establishing concrete measures for detecting
malware in Android platforms.
Notably, the fact that the majority of applications utilized in an Android platform can
be accessed from a common source provides leeway for publishers of malware content.
As such, there is always the likelihood that a user with malicious intent can publish an
application that is intended to act as malware. In the majority of cases, a potential malware
application usually mimics a typical app though it is designed to achieve root control
Computers 2022, 11, 173. https://doi.org/10.3390/computers11120173 https://www.mdpi.com/journal/computers
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭