Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection - Publication - Bridge of Knowledge

Search

Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection

Abstract

As a result of the rapid advancement of mobile and internet technology, a plethora of new mobile security risks has recently emerged. Many techniques have been developed to address the risks associated with Android malware. The most extensively used method for identifying Android malware is signature-based detection. The drawback of this method, however, is that it is unable to detect unknown malware. As a consequence of this problem, machine learning (ML) methods for detecting and classifying malware applications were developed. The goal of conventional ML approaches is to improve classification accuracy. However, owing to imbalanced real-world datasets, the traditional classification algorithms perform poorly in detecting malicious apps. As a result, in this study, we developed a meta-learning approach based on the forest penalizing attribute (FPA) classification algorithm for detecting malware applications. In other words, with this research, we investigated how to improve Android malware detection by applying empirical analysis of FPA and its enhanced variants (Cas_FPA and RoF_FPA). The proposed FPA and its enhanced variants were tested using the Malgenome and Drebin Android malware datasets, which contain features gathered from both static and dynamic Android malware analysis. Furthermore, the findings obtained using the proposed technique were compared with baseline classifiers and existing malware detection methods to validate their effectiveness in detecting malware application families. Based on the findings, FPA outperforms the baseline classifiers and existing ML-based Android malware detection models in dealing with the unbalanced family categorization of Android malware apps, with an accuracy of 98.94% and an area under curve (AUC) value of 0.999. Hence, further development and deployment of FPA-based meta-learners for Android malware detection and other cybersecurity threats is recommended.

Citations

  • 8

    CrossRef

  • 0

    Web of Science

  • 8

    Scopus

Authors (10)

  • Photo of  Abimbola G. Akintola

    Abimbola G. Akintola

    • Department of Computer Science, University of Ilorin, Ilorin 1515, Nigeria
  • Photo of  Abdullateef O. Balogun

    Abdullateef O. Balogun

    • Department of Computer Science, University of Ilorin, Ilorin 1515, Nigeria
  • Photo of  Luiz Fernando Capretz

    Luiz Fernando Capretz

    • Department of Electrical and Computer Engineering, Western University, London, ON N6A 5B9, Canada
  • Photo of  Shuib Basri

    Shuib Basri

    • Department of Computer and Information Science, Universiti Teknologi PETRONAS, Bandar Seri Iskandar 32610, Perak, Malaysia
  • Photo of  Shakirat A. Salihu

    Shakirat A. Salihu

    • Department of Computer Science, University of Ilorin, Ilorin 1515, Nigeria
  • Photo of  Fatima E. Usman-Hamza

    Fatima E. Usman-Hamza

    • Department of Computer Science, University of Ilorin, Ilorin 1515, Nigeria
  • Photo of  Peter O. Sadiku

    Peter O. Sadiku

    • Department of Computer Science, University of Ilorin, Ilorin 1515, Nigeria
  • Photo of  Ghaniyyat B. Balogun

    Ghaniyyat B. Balogun

    • Department of Computer Science, University of Ilorin, Ilorin 1515, Nigeria
  • Photo of  Zubair O. Alanamu

    Zubair O. Alanamu

    • Department of Computer Science, University of Ilorin, Ilorin 1515, Nigeria

Keywords

Details

Category:
Articles
Type:
artykuły w czasopismach
Published in:
Applied Sciences-Basel no. 12,
ISSN: 2076-3417
Language:
English
Publication year:
2022
Bibliographic description:
Akintola A. G., Balogun A. O., Capretz L. F., Mojeed H., Basri S., Salihu S. A., Usman-Hamza F. E., Sadiku P. O., Balogun G. B., Alanamu Z. O.: Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection// Applied Sciences-Basel -Vol. 12,iss. 9 (2022), s.4664-
DOI:
Digital Object Identifier (open in new tab) 10.3390/app12094664
Verified by:
Gdańsk University of Technology

seen 64 times

Recommended for you

Meta Tags