4.6 Article Proceedings Paper

Evaluation of machine learning classifiers for mobile malware detection

期刊

SOFT COMPUTING
卷 20, 期 1, 页码 343-357

出版社

SPRINGER
DOI: 10.1007/s00500-014-1511-6

关键词

Intrusion detection system; Machine learning; Android malware detection; Anomaly based; Mobile device

向作者/读者索取更多资源

Mobile devices have become a significant part of people's lives, leading to an increasing number of users involved with such technology. The rising number of users invites hackers to generate malicious applications. Besides, the security of sensitive data available on mobile devices is taken lightly. Relying on currently developed approaches is not sufficient, given that intelligent malware keeps modifying rapidly and as a result becomes more difficult to detect. In this paper, we propose an alternative solution to evaluating malware detection using the anomaly-based approach with machine learning classifiers. Among the various network traffic features, the four categories selected are basic information, content based, time based and connection based. The evaluation utilizes two datasets: public (i.e. MalGenome) and private (i.e. self-collected). Based on the evaluation results, both the Bayes network and random forest classifiers produced more accurate readings, with a 99.97 % true-positive rate (TPR) as opposed to the multi-layer perceptron with only 93.03 % on the MalGenome dataset. However, this experiment revealed that the k-nearest neighbor classifier efficiently detected the latest Android malware with an 84.57 % true-positive rate higher than other classifiers.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Multidisciplinary Sciences

Prioritized Shortest Path Computation Mechanism (PSPCM) for wireless sensor networks

Innocent Uzougbo Onwuegbuzie, Shukor Abd Razak, Ismail Fauzi Isnin, Arafat Al-dhaqm, Nor Badrul Anuar

Summary: This article proposes a Prioritized Shortest Path Computation Mechanism (PSPCM) to address the issues of heterogeneous data and inefficient power management. The mechanism prioritizes different classes of data based on their priority and routes them through the shortest and power-efficient paths. PSPCM outperforms related mechanisms with higher Packet Delivery Ratio (PDR) and lower power consumption, resulting in better battery saving and prolonged operational lifetime while accommodating data with varying priorities.

PLOS ONE (2022)

Article Environmental Sciences

Understanding COVID-19 Halal Vaccination Discourse on Facebook and Twitter Using Aspect-Based Sentiment Analysis and Text Emotion Analysis

Ali Feizollah, Nor Badrul Anuar, Riyadh Mehdi, Ahmad Firdaus, Ainin Sulaiman

Summary: This study analyzes the discourse related to halal vaccines on Facebook and Twitter using aspect-based sentiment analysis and text emotion analysis. It finds differences in the discussion and sentiment towards halal vaccines between the two platforms.

INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH (2022)

Article Mathematics, Interdisciplinary Applications

A Novel Feature Selection Method for Classification of Medical Data Using Filters, Wrappers, and Embedded Approaches

Saba Bashir, Irfan Ullah Khattak, Aihab Khan, Farhan Hassan Khan, Abdullah Gani, Muhammad Shiraz

Summary: The study aims to enhance classification accuracy using effective feature selection algorithms, utilizing different feature selection methods and SVM classifier to classify data, achieving high accuracy on microarray and heart disease datasets.

COMPLEXITY (2022)

Article Computer Science, Information Systems

Auction Mechanism-Based Sectored Fractional Frequency Reuse for Irregular Geometry Multicellular Networks

Rahat Ullah, Abdullah Gani, Muhammad Shiraz, Imran Khan Yousufzai, Khalid Zaman

Summary: This paper proposes an Auction Mechanism-based Sectored-FFR (AMS-FFR) scheme for optimally distributing bandwidth resources to individual users in realistic multicellular network deployments. Simulation results show that the presented scheme outperforms prevailing FFR schemes in terms of achievable throughput, average sum rate, and user satisfaction.

ELECTRONICS (2022)

Article Computer Science, Information Systems

Fifteen years of YouTube scholarly research: knowledge structure, collaborative networks, and trending topics

Mohamed M. Mostafa, Ali Feizollah, Nor Badrul Anuar

Summary: This study provides a bibliometric analysis on YouTube as an information source, revealing the development trends and key topics in YouTube research. The findings show that YouTube research underwent rapid growth from 2008 to 2017 and has entered a stage of consolidation and stabilization from 2017 to 2021. The USA, Turkey, and the UK are the countries with the highest number of publications, while a small number of journals published the majority of relevant papers. Keyword analysis indicates that video sharing, web-based learning, and COVID-19 are the hot topics in research. The results of Multiple Correspondence Analysis (MCA) classify the research into three conceptual clusters: user-generated content, health and medical issues, and information quality.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Article Automation & Control Systems

A Trustworthy, Reliable, and Lightweight Privacy and Data Integrity Approach for the Internet of Things

Rahim Khan, Jason Teo, Mian Ahmad Jan, Sahil Verma, Ryan Alturki, Abdullah Ghani

Summary: This article proposes a lightweight and trustworthy device-to-server mutual authentication scheme for edge-enabled IoT networks. Simulation results validate its exceptional performance compared to field proven approaches.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Business

A bibliometric and content analysis of technological advancement applications in agricultural e-commerce

Hamza H. M. Altarturi, Adibi Rahiman Md Nor, Noor Ismawati Jaafar, Nor Badrul Anuar

Summary: Given the challenges imposed by the COVID-19 pandemic, agribusinesses are urged to adopt e-commerce and advanced technologies to market and sell agricultural products. Agricultural e-commerce utilizing advanced technologies not only facilitates sustainable economic growth and gender equality but also enables farmers to access new markets, bypass intermediaries, and reduce waste. However, the effectiveness of agricultural e-commerce depends on addressing the emerging challenges from both agricultural and e-commerce perspectives. This study aims to provide a comprehensive roadmap of technological advancements and challenges in agricultural e-commerce, along with proposing a conceptual architecture for best practices.

ELECTRONIC COMMERCE RESEARCH (2023)

Article Chemistry, Analytical

Analyzing the Impact of Active Attack on the Performance of the AMCTD Protocol in Underwater Wireless Sensor Networks

Khalid Saeed, Wajeeha Khalil, Ahmad Sami Al-Shamayleh, Iftikhar Ahmad, Adnan Akhunzada, Salman Z. ALharethi, Abdullah Gani

Summary: The exponentially growing concern of cyber-attacks on extremely dense underwater sensor networks (UWSNs) and the evolution of UWSNs digital threat landscape has brought novel research challenges and issues. This research implements an active attack in the Adaptive Mobility of Courier Nodes in Threshold-optimized Depth-based Routing (AMCTD) protocol to evaluate its performance. The preliminary research findings show that active attack drastically lowers the AMCTD protocol's performance.

SENSORS (2023)

Article Chemistry, Analytical

Formal Analysis of Trust and Reputation for Service Composition in IoT

Abdelmuttlib Ibrahim Abdalla Ahmed, Siti Hafizah Ab Hamid, Abdullah Gani, Ahmed Abdelaziz, Mohammed Abaker

Summary: The rapid growth of smart devices connected to the Internet of Things (IoT) has raised challenges in terms of interoperability. A service-oriented architecture for IoT (SOA-IoT) has been proposed to address these challenges by integrating web services into sensor networks via IoT-optimized gateways. Trust-based approaches have been found to outperform non-trust-based approaches in service composition for IoT. These approaches use a trust and reputation system to select appropriate service providers based on trust values computed from self-observation and recommendations. However, a formal method for trust-based service composition is lacking in the IoT. This study used a formal method to represent trust-based service management components in the IoT and identified the impact of trust attacks on service composition.

SENSORS (2023)

Article Green & Sustainable Science & Technology

A Comprehensive Analysis of Security-Based Schemes in Underwater Wireless Sensor Networks

Khalid Saeed, Wajeeha Khalil, Ahmad Sami Al-Shamayleh, Sheeraz Ahmed, Adnan Akhunzada, Salman Z. Alharthi, Abdullah Gani

Summary: This research analyzes the security-based schemes in underwater wireless sensor networks (UWSNs) and categorizes them into five sub-categories. It discusses the major contributions, techniques used, possible future research issues, and implementation tools for each security-based scheme. The identified open research issues and future trends can be further explored by the research community.

SUSTAINABILITY (2023)

Article Chemistry, Multidisciplinary

Sensing and Device Neighborhood-Based Slot Assignment Approach for the Internet of Things

Mushtaq Khan, Rahim Khan, Nadir Shah, Abdullah Ghani, Samia Allaoua Chelloug, Wasif Nisar, Jason Teo

Summary: This paper presents a neighborhood-based smart slot allocation scheme for IoT networks, with a focus on mobile devices. The scheme resolves concurrent communication issues by maintaining two types of slots (dedicated and reserved) and assigning them to devices based on a FCFS basis. Simulation results show that the proposed scheme outperforms existing approaches in terms of lifetime, slot allocation, and slot waiting time.

APPLIED SCIENCES-BASEL (2023)

Article Computer Science, Artificial Intelligence

RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things

Zainab Alansari, Nor Badrul Anuar, Amirrudin Kamsin, Mohammad Riyaz Belgaum

Summary: This article presents a lightweight system, RPLAD3, for detecting attacks in the RPL protocol. It effectively identifies grayhole, blackhole, and selective forwarding attacks, improves packet delivery ratio, and reduces power consumption.

PEERJ COMPUTER SCIENCE (2023)

Article Computer Science, Information Systems

Risk Factors and Practices for the Development of Open Source Software From Developers' Perspective

Shehzad Haider, Wajeeha Khalil, Ahmad Sami Al-Shamayleh, Adnan Akhunzada, Abdullah Gani

Summary: Open source software (OSS) has gained popularity, but it faces quality problems, security issues, and challenges. This research aims to identify and address the risk factors associated with OSS and provide practices for risk mitigation. A systematic literature review and questionnaire survey were conducted to identify risk factors and validate findings. 14 risk factors and 31 practices for mitigating them in OSS development were identified. Focusing on these factors can minimize risks and improve software productivity and reliability.

IEEE ACCESS (2023)

Article Multidisciplinary Sciences

ROOTECTOR: Robust Android Rooting Detection Framework Using Machine Learning Algorithms

Wael F. Elsersy, Nor Badrul Anuar, Mohd Faizal Ab Razak

Summary: This study proposes a framework for detecting Android rooted devices using machine learning classification techniques, and the experimental evaluation shows a high level of accuracy for the framework.

ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING (2023)

暂无数据