Generate optimal number of features in mobile malware classification using Venn diagram intersection
Smartphones are growing more susceptible as technology develops because they contain sensitive data that offers a severe security risk if it falls into the wrong hands. The Android OS includes permissions as a crucial component for safeguarding user privacy and confidentiality. On the other hand, mo...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
International Journal of Computer Science and Network Security
2022
|
Online Access: | http://eprints.utem.edu.my/id/eprint/26589/2/IJCSNS-GENERATE%20OPTIMAL%20NUMBER%20OF%20FEATURES%20IN%20MMC%20USING%20VENN%20DIAGRAM%20INTERSECTION.PDF http://eprints.utem.edu.my/id/eprint/26589/ http://paper.ijcsns.org/07_book/202207/20220748.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utem.eprints.26589 |
---|---|
record_format |
eprints |
spelling |
my.utem.eprints.265892023-03-24T10:52:18Z http://eprints.utem.edu.my/id/eprint/26589/ Generate optimal number of features in mobile malware classification using Venn diagram intersection Ismail, Najiahtul Syafiqah Yusof, Robiah Abdollah, Mohd Faizal Smartphones are growing more susceptible as technology develops because they contain sensitive data that offers a severe security risk if it falls into the wrong hands. The Android OS includes permissions as a crucial component for safeguarding user privacy and confidentiality. On the other hand, mobile malware continues to struggle with permission misuse. Although permission-based detection is frequently utilized, the significant false alarm rates brought on by the permission-based issue are thought to make it inadequate. The present detection method has a high incidence of false alarms, which reduces its ability to identify permission-based attacks. By using permission features with intent, this research attempted to improve permission-based detection. However, it creates an excessive number of features and increases the likelihood of false alarms. In order to generate the optimal number of features created and boost the quality of features chosen, this research developed an intersection feature approach. Performance was assessed using metrics including accuracy, TPR, TNR, and FPR. The most important characteristics were chosen using the Correlation Feature Selection, and the malicious program was categorized using SVM and naive Bayes. The Intersection Feature Technique, according to the findings, reduces characteristics from 486 to 17, has a 97 percent accuracy rate, and produces 0.1 percent false alarms. International Journal of Computer Science and Network Security 2022-07 Article PeerReviewed text en http://eprints.utem.edu.my/id/eprint/26589/2/IJCSNS-GENERATE%20OPTIMAL%20NUMBER%20OF%20FEATURES%20IN%20MMC%20USING%20VENN%20DIAGRAM%20INTERSECTION.PDF Ismail, Najiahtul Syafiqah and Yusof, Robiah and Abdollah, Mohd Faizal (2022) Generate optimal number of features in mobile malware classification using Venn diagram intersection. IJCSNS International Journal of Computer Science and Network Security, 22 (7). pp. 389-396. ISSN 1738-7906 http://paper.ijcsns.org/07_book/202207/20220748.pdf 10.22937/IJCSNS.2022.22.7.48 |
institution |
Universiti Teknikal Malaysia Melaka |
building |
UTEM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknikal Malaysia Melaka |
content_source |
UTEM Institutional Repository |
url_provider |
http://eprints.utem.edu.my/ |
language |
English |
description |
Smartphones are growing more susceptible as technology develops because they contain sensitive data that offers a severe security risk if it falls into the wrong hands. The Android OS includes permissions as a crucial component for safeguarding user privacy and confidentiality. On the other hand, mobile malware continues to struggle with permission misuse. Although permission-based detection is frequently utilized, the significant false alarm rates brought on by the permission-based issue are thought to make it inadequate. The present detection method has a high incidence of false alarms, which reduces its ability to identify permission-based attacks. By using permission features with intent, this research attempted to improve permission-based detection. However, it creates an excessive number of features and increases the likelihood of false alarms. In order to generate the optimal number of features created and boost the quality of features chosen, this research developed an intersection feature approach. Performance was assessed using metrics including accuracy, TPR, TNR, and FPR. The most important characteristics were chosen using the Correlation Feature Selection, and the malicious program was categorized using SVM and naive Bayes. The Intersection Feature Technique, according to the findings, reduces characteristics from 486 to 17, has a 97 percent accuracy rate, and produces 0.1 percent false alarms. |
format |
Article |
author |
Ismail, Najiahtul Syafiqah Yusof, Robiah Abdollah, Mohd Faizal |
spellingShingle |
Ismail, Najiahtul Syafiqah Yusof, Robiah Abdollah, Mohd Faizal Generate optimal number of features in mobile malware classification using Venn diagram intersection |
author_facet |
Ismail, Najiahtul Syafiqah Yusof, Robiah Abdollah, Mohd Faizal |
author_sort |
Ismail, Najiahtul Syafiqah |
title |
Generate optimal number of features in mobile malware classification using Venn diagram intersection |
title_short |
Generate optimal number of features in mobile malware classification using Venn diagram intersection |
title_full |
Generate optimal number of features in mobile malware classification using Venn diagram intersection |
title_fullStr |
Generate optimal number of features in mobile malware classification using Venn diagram intersection |
title_full_unstemmed |
Generate optimal number of features in mobile malware classification using Venn diagram intersection |
title_sort |
generate optimal number of features in mobile malware classification using venn diagram intersection |
publisher |
International Journal of Computer Science and Network Security |
publishDate |
2022 |
url |
http://eprints.utem.edu.my/id/eprint/26589/2/IJCSNS-GENERATE%20OPTIMAL%20NUMBER%20OF%20FEATURES%20IN%20MMC%20USING%20VENN%20DIAGRAM%20INTERSECTION.PDF http://eprints.utem.edu.my/id/eprint/26589/ http://paper.ijcsns.org/07_book/202207/20220748.pdf |
_version_ |
1761623111898234880 |
score |
13.160551 |