Generate optimal number of features in mobile malware classification using Venn diagram intersection

Smartphones are growing more susceptible as technology develops because they contain sensitive data that offers a severe security risk if it falls into the wrong hands. The Android OS includes permissions as a crucial component for safeguarding user privacy and confidentiality. On the other hand, mo...

Full description

Saved in:
Bibliographic Details
Main Authors: Ismail, Najiahtul Syafiqah, Yusof, Robiah, Abdollah, Mohd Faizal
Format: Article
Language:English
Published: International Journal of Computer Science and Network Security 2022
Online Access:http://eprints.utem.edu.my/id/eprint/26589/2/IJCSNS-GENERATE%20OPTIMAL%20NUMBER%20OF%20FEATURES%20IN%20MMC%20USING%20VENN%20DIAGRAM%20INTERSECTION.PDF
http://eprints.utem.edu.my/id/eprint/26589/
http://paper.ijcsns.org/07_book/202207/20220748.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utem.eprints.26589
record_format eprints
spelling my.utem.eprints.265892023-03-24T10:52:18Z http://eprints.utem.edu.my/id/eprint/26589/ Generate optimal number of features in mobile malware classification using Venn diagram intersection Ismail, Najiahtul Syafiqah Yusof, Robiah Abdollah, Mohd Faizal Smartphones are growing more susceptible as technology develops because they contain sensitive data that offers a severe security risk if it falls into the wrong hands. The Android OS includes permissions as a crucial component for safeguarding user privacy and confidentiality. On the other hand, mobile malware continues to struggle with permission misuse. Although permission-based detection is frequently utilized, the significant false alarm rates brought on by the permission-based issue are thought to make it inadequate. The present detection method has a high incidence of false alarms, which reduces its ability to identify permission-based attacks. By using permission features with intent, this research attempted to improve permission-based detection. However, it creates an excessive number of features and increases the likelihood of false alarms. In order to generate the optimal number of features created and boost the quality of features chosen, this research developed an intersection feature approach. Performance was assessed using metrics including accuracy, TPR, TNR, and FPR. The most important characteristics were chosen using the Correlation Feature Selection, and the malicious program was categorized using SVM and naive Bayes. The Intersection Feature Technique, according to the findings, reduces characteristics from 486 to 17, has a 97 percent accuracy rate, and produces 0.1 percent false alarms. International Journal of Computer Science and Network Security 2022-07 Article PeerReviewed text en http://eprints.utem.edu.my/id/eprint/26589/2/IJCSNS-GENERATE%20OPTIMAL%20NUMBER%20OF%20FEATURES%20IN%20MMC%20USING%20VENN%20DIAGRAM%20INTERSECTION.PDF Ismail, Najiahtul Syafiqah and Yusof, Robiah and Abdollah, Mohd Faizal (2022) Generate optimal number of features in mobile malware classification using Venn diagram intersection. IJCSNS International Journal of Computer Science and Network Security, 22 (7). pp. 389-396. ISSN 1738-7906 http://paper.ijcsns.org/07_book/202207/20220748.pdf 10.22937/IJCSNS.2022.22.7.48
institution Universiti Teknikal Malaysia Melaka
building UTEM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknikal Malaysia Melaka
content_source UTEM Institutional Repository
url_provider http://eprints.utem.edu.my/
language English
description Smartphones are growing more susceptible as technology develops because they contain sensitive data that offers a severe security risk if it falls into the wrong hands. The Android OS includes permissions as a crucial component for safeguarding user privacy and confidentiality. On the other hand, mobile malware continues to struggle with permission misuse. Although permission-based detection is frequently utilized, the significant false alarm rates brought on by the permission-based issue are thought to make it inadequate. The present detection method has a high incidence of false alarms, which reduces its ability to identify permission-based attacks. By using permission features with intent, this research attempted to improve permission-based detection. However, it creates an excessive number of features and increases the likelihood of false alarms. In order to generate the optimal number of features created and boost the quality of features chosen, this research developed an intersection feature approach. Performance was assessed using metrics including accuracy, TPR, TNR, and FPR. The most important characteristics were chosen using the Correlation Feature Selection, and the malicious program was categorized using SVM and naive Bayes. The Intersection Feature Technique, according to the findings, reduces characteristics from 486 to 17, has a 97 percent accuracy rate, and produces 0.1 percent false alarms.
format Article
author Ismail, Najiahtul Syafiqah
Yusof, Robiah
Abdollah, Mohd Faizal
spellingShingle Ismail, Najiahtul Syafiqah
Yusof, Robiah
Abdollah, Mohd Faizal
Generate optimal number of features in mobile malware classification using Venn diagram intersection
author_facet Ismail, Najiahtul Syafiqah
Yusof, Robiah
Abdollah, Mohd Faizal
author_sort Ismail, Najiahtul Syafiqah
title Generate optimal number of features in mobile malware classification using Venn diagram intersection
title_short Generate optimal number of features in mobile malware classification using Venn diagram intersection
title_full Generate optimal number of features in mobile malware classification using Venn diagram intersection
title_fullStr Generate optimal number of features in mobile malware classification using Venn diagram intersection
title_full_unstemmed Generate optimal number of features in mobile malware classification using Venn diagram intersection
title_sort generate optimal number of features in mobile malware classification using venn diagram intersection
publisher International Journal of Computer Science and Network Security
publishDate 2022
url http://eprints.utem.edu.my/id/eprint/26589/2/IJCSNS-GENERATE%20OPTIMAL%20NUMBER%20OF%20FEATURES%20IN%20MMC%20USING%20VENN%20DIAGRAM%20INTERSECTION.PDF
http://eprints.utem.edu.my/id/eprint/26589/
http://paper.ijcsns.org/07_book/202207/20220748.pdf
_version_ 1761623111898234880
score 13.160551