Android Malware Prediction Using Extreme Learning Machine with Different Kernel Functions

L. Kumar, C. Hota, Arvind Mahindru, Lalita Bhanu Murthy Neti
{"title":"Android Malware Prediction Using Extreme Learning Machine with Different Kernel Functions","authors":"L. Kumar, C. Hota, Arvind Mahindru, Lalita Bhanu Murthy Neti","doi":"10.1145/3340422.3343639","DOIUrl":null,"url":null,"abstract":"Android is currently the most popular smartphone platform which occupied 88% of global sale by the end of 2nd quarter 2018. With the popularity of these applications, it is also inviting cybercriminals to develop malware application for accessing important information from smartphones. The major objective of cybercriminals to develop Malware apps or Malicious apps to threaten the organization privacy data, user privacy data, and device integrity. Early identification of such malware apps can help the android user to save private data and device integrity. In this study, features extracted from intermediate code representations obtained using decompilation of APK file are used for providing requisite input data to develop the models for predicting android malware applications. These models are trained using extreme learning with multiple kernel functions ans also compared with the model trained using most frequently used classifiers like linear regression, decision tree, polynomial regression, and logistic regression. This paper also focuses on the effectiveness of data sampling techniques for balancing data and feature selection methods for selecting right sets of significant uncorrelated metrics. The high-value of accuracy and AUC confirm the predicting capability of data sampling, sets of metrics, and training algorithms to malware and normal applications.","PeriodicalId":206077,"journal":{"name":"Proceedings of the 15th Asian Internet Engineering Conference","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 15th Asian Internet Engineering Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3340422.3343639","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

Android is currently the most popular smartphone platform which occupied 88% of global sale by the end of 2nd quarter 2018. With the popularity of these applications, it is also inviting cybercriminals to develop malware application for accessing important information from smartphones. The major objective of cybercriminals to develop Malware apps or Malicious apps to threaten the organization privacy data, user privacy data, and device integrity. Early identification of such malware apps can help the android user to save private data and device integrity. In this study, features extracted from intermediate code representations obtained using decompilation of APK file are used for providing requisite input data to develop the models for predicting android malware applications. These models are trained using extreme learning with multiple kernel functions ans also compared with the model trained using most frequently used classifiers like linear regression, decision tree, polynomial regression, and logistic regression. This paper also focuses on the effectiveness of data sampling techniques for balancing data and feature selection methods for selecting right sets of significant uncorrelated metrics. The high-value of accuracy and AUC confirm the predicting capability of data sampling, sets of metrics, and training algorithms to malware and normal applications.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于不同内核函数的极限学习机的Android恶意软件预测
安卓是目前最受欢迎的智能手机平台,截至2018年第二季度末,安卓占据了全球销量的88%。随着这些应用程序的普及,它也在邀请网络犯罪分子开发恶意软件,以获取智能手机上的重要信息。网络犯罪分子的主要目标是开发恶意软件或恶意应用程序来威胁组织隐私数据、用户隐私数据和设备完整性。早期识别此类恶意软件可以帮助android用户保存私人数据和设备完整性。在本研究中,从APK文件反编译获得的中间代码表示中提取的特征用于提供必要的输入数据,以开发预测android恶意软件应用的模型。这些模型使用具有多个核函数的极限学习进行训练,并与使用最常用的分类器(如线性回归、决策树、多项式回归和逻辑回归)训练的模型进行比较。本文还侧重于数据采样技术的有效性,以平衡数据和特征选择方法,以选择正确的重要不相关指标集。高精确度和AUC值确认了数据采样、度量集和训练算法对恶意软件和正常应用程序的预测能力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
An Accurate Packet Loss Emulation on a DPDK-based Network Emulator Tagging based Packet Loss Detection and Recovery of IP Multicast in SDN Passive analysis for multipath TCP Estimation of Data Propagation Time on the Bitcoin Network Distributed Hayabusa: Scalable Syslog Search Engine Optimized for Time-Dimensional Search
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1