A visualization-based analysis on classifying android malware
Version 2 2024-06-06, 00:31Version 2 2024-06-06, 00:31
Version 1 2019-09-26, 10:15Version 1 2019-09-26, 10:15
conference contribution
posted on 2024-06-06, 00:31authored byRory Coulter, Lei Pan, Jun Zhang, Yang Xiang
Since the introduction of the Android mobile platform, the state of mobile malware has evolved in both attack sophistication and its ability to evade detection. Given the right combination of elements, the detection of malicious applications may be found among those that pose no threat, yet the threats that exist across these malware types reveal distinguishable attack characteristics. This paper investigates the benign and attacking characteristics. By plotting complex features into dendrograms, we propose a novel approach to visually distinguish Android apps. We visualize the complicated relationship and evaluate the effect of different text mining methods. Specifically, we employ machine learning techniques including feature reduction using Principle Component Analysis, and the Random Forest classifier, to compare eight different models. Using the Drebin dataset, we achieved an average accuracy of 95.83%.
History
Volume
11806
Location
Xi'an, China
Start date
2019-09-19
End date
2019-09-21
ISSN
0302-9743
eISSN
1611-3349
ISBN-13
9783030306199
Language
eng
Publication classification
E1 Full written paper - refereed
Copyright notice
2019, Springer Nature Switzerland AG
Editor/Contributor(s)
Chen X, Huang X, Zhang J
Title of proceedings
ML4CS 2019 : Proceedings of the Second International Conference on Machine Learning for Cyber Security
Event
Machine Learning for Cyber Security. International Conference (2nd: 2019 : Xi’an, China)