|
Depot Institutionnel de l'UMBB >
Publications Scientifiques >
Communications Internationales >
Veuillez utiliser cette adresse pour citer ce document :
http://dlibrary.univ-boumerdes.dz:8080/handle/123456789/13763
|
Titre: | Towards a Longitudinal Comparison Between Different Strategies for Android Malware Detection |
Auteur(s): | Mesbah, Abdelhak Baddari, Ibtihel Riahla, Mohamed Amine |
Mots-clés: | Android Permission Android Security API calls Machine Learning Static Analysis |
Date de publication: | 2023 |
Editeur: | Institute of Electrical and Electronics Engineers Inc |
Collection/Numéro: | 2023 Third International Conference on Theoretical and Applicative Aspects of Computer Science (ICTAACS), Skikda, Algeria, 2023;pp. 1-6 |
Résumé: | The growing popularity of the Android platform makes it a target of malware authors. The effective identification of such malware is an ongoing challenge. Several methods using machine learning have been proposed to prevent this threat. These methods are usually conventionally evaluated without considering the extent of performance over time. Given the evolving nature of both malware and benign apps, conventional evaluation may lack information. To imitate reality, this study compares the longitudinal performance of different machine learning models, using different strategies that combine permissions and API calls as features extracted through static analysis. Thus, to determine which strategy of features on which classifier are most effective to characterize malware for building a robust malware detector. To achieve this goal, on the one hand, we use a large real-world app set consisting of 100K (50k benign, 50k malware) apps date-labeled, collected across ten years, first seen between 2013 and 2022. On the other hand, each feature's strategy is fed into five classifiers (i.e., SVM, RF, LR, DT, and ANN), using old apps for the training and new apps for the evaluation. Among the assessed machine learning models, the SVM achieves the most promising results over time by employing the combination strategy of the high difference usage of API calls and permissions. |
URI/URL: | https://ieeexplore.ieee.org/document/10449650 10.1109/ICTAACS60400.2023.10449650 http://dlibrary.univ-boumerdes.dz:8080/handle/123456789/13763 |
ISBN: | 979-835038585-4 |
Collection(s) : | Communications Internationales
|
Fichier(s) constituant ce document :
|
Tous les documents dans DSpace sont protégés par copyright, avec tous droits réservés.
|