Identification of Significant Permissions for Efficient Android Malware Detection
AI-generated Key Points
⚠The license of the paper does not allow us to build upon its content and the key points are generated using the paper metadata rather than the full article.
- Malware on Android OS for smartphones is a significant concern due to the 3Vs of volume, velocity, and variety contributing to their growth
- One in every five business/industry mobile applications leaks sensitive personal data
- Traditional signature/heuristic-based malware detection systems are inadequate in dealing with current malware challenges on Android OS
- Researchers have turned to machine learning and deep learning-based malware detection systems
- A study titled "Identification of Significant Permissions for Efficient Android Malware Detection" conducted a comprehensive feature analysis to identify crucial Android permissions necessary for efficient malware detection using machine learning and deep neural networks
- The authors derived a set of 16 permissions (8% of the total set) to construct a malware detection engine that requires less training and testing time without compromising model accuracy significantly
- The random forest classifier-based Android malware detection model achieves an impressive area under curve score of 97.7%, surpassing current state-of-the-art systems' performance
- Deep neural networks attain comparable accuracy levels as baseline results but come at a massive computational penalty
- This study's findings provide valuable insights into identifying critical Android permissions necessary for efficient malware detection using machine learning and deep neural networks while highlighting the limitations of traditional signature/heuristic-based approaches in addressing current malware challenges on Android OS for smartphones.
Authors: Hemant Rathore, Sanjay K. Sahay, Ritvik Rajvanshi, Mohit Sewak
Abstract: Since Google unveiled Android OS for smartphones, malware are thriving with 3Vs, i.e. volume, velocity, and variety. A recent report indicates that one out of every five business/industry mobile application leaks sensitive personal data. Traditional signature/heuristic-based malware detection systems are unable to cope up with current malware challenges and thus threaten the Android ecosystem. Therefore recently researchers have started exploring machine learning and deep learning based malware detection systems. In this paper, we performed a comprehensive feature analysis to identify the significant Android permissions and propose an efficient Android malware detection system using machine learning and deep neural network. We constructed a set of $16$ permissions ($8\%$ of the total set) derived from variance threshold, auto-encoders, and principal component analysis to build a malware detection engine that consumes less train and test time without significant compromise on the model accuracy. Our experimental results show that the Android malware detection model based on the random forest classifier is most balanced and achieves the highest area under curve score of $97.7\%$, which is better than the current state-of-art systems. We also observed that deep neural networks attain comparable accuracy to the baseline results but with a massive computational penalty.
Ask questions about this paper to our AI assistant
You can also chat with multiple papers at once here.
⚠The license of the paper does not allow us to build upon its content and the AI assistant only knows about the paper metadata rather than the full article.
Assess the quality of the AI-generated content by voting
Score: 0
Why do we need votes?
Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.
The previous summary was created more than a year ago and can be re-run (if necessary) by clicking on the Run button below.
⚠The license of this specific paper does not allow us to build upon its content and the summarizing tools will be run using the paper metadata rather than the full article. However, it still does a good job, and you can also try our tools on papers with more open licenses.
Similar papers summarized with our AI tools
Navigate through even more similar papers through a
tree representationLook for similar papers (in beta version)
By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.
Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.