Cargando…

Data on Vulnerability Detection in Android

The data in this article have been collaborated from mainly four sources- Google Playstore, Wandoujia (third party app store market), AMD and Androzoo. These data include ~85,000 APKs (Android Package Kit), both malicious and benign from these data sources. Static and dynamic features are extracted...

Descripción completa

Detalles Bibliográficos
Autores principales: Garg, Shivi, Baliyan, Niyati
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Elsevier 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6377051/
https://www.ncbi.nlm.nih.gov/pubmed/30815521
http://dx.doi.org/10.1016/j.dib.2018.12.038
Descripción
Sumario:The data in this article have been collaborated from mainly four sources- Google Playstore, Wandoujia (third party app store market), AMD and Androzoo. These data include ~85,000 APKs (Android Package Kit), both malicious and benign from these data sources. Static and dynamic features are extracted from these APK files, and then supervised machines learning algorithms are employed for malware detection in Android. This data article also provides the Python code for data analysis. For feature extraction, a generic algorithm has also been incorporated, thereby, selecting important and relevant feature subset. Conclusive results obtained from this data set are further comprehended and interpreted in our latest research study “A Novel Parallel Classifier Scheme for Vulnerability Detection in Android” (Garg et al., 2018). This proved to be precious contribution for ensembling classifiers in machine learning to detect malware in Android.