Cargando…

Data on Vulnerability Detection in Android

The data in this article have been collaborated from mainly four sources- Google Playstore, Wandoujia (third party app store market), AMD and Androzoo. These data include ~85,000 APKs (Android Package Kit), both malicious and benign from these data sources. Static and dynamic features are extracted...

Descripción completa

Detalles Bibliográficos
Autores principales: Garg, Shivi, Baliyan, Niyati
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Elsevier 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6377051/
https://www.ncbi.nlm.nih.gov/pubmed/30815521
http://dx.doi.org/10.1016/j.dib.2018.12.038
_version_ 1783395689845227520
author Garg, Shivi
Baliyan, Niyati
author_facet Garg, Shivi
Baliyan, Niyati
author_sort Garg, Shivi
collection PubMed
description The data in this article have been collaborated from mainly four sources- Google Playstore, Wandoujia (third party app store market), AMD and Androzoo. These data include ~85,000 APKs (Android Package Kit), both malicious and benign from these data sources. Static and dynamic features are extracted from these APK files, and then supervised machines learning algorithms are employed for malware detection in Android. This data article also provides the Python code for data analysis. For feature extraction, a generic algorithm has also been incorporated, thereby, selecting important and relevant feature subset. Conclusive results obtained from this data set are further comprehended and interpreted in our latest research study “A Novel Parallel Classifier Scheme for Vulnerability Detection in Android” (Garg et al., 2018). This proved to be precious contribution for ensembling classifiers in machine learning to detect malware in Android.
format Online
Article
Text
id pubmed-6377051
institution National Center for Biotechnology Information
language English
publishDate 2018
publisher Elsevier
record_format MEDLINE/PubMed
spelling pubmed-63770512019-02-27 Data on Vulnerability Detection in Android Garg, Shivi Baliyan, Niyati Data Brief Computer Science The data in this article have been collaborated from mainly four sources- Google Playstore, Wandoujia (third party app store market), AMD and Androzoo. These data include ~85,000 APKs (Android Package Kit), both malicious and benign from these data sources. Static and dynamic features are extracted from these APK files, and then supervised machines learning algorithms are employed for malware detection in Android. This data article also provides the Python code for data analysis. For feature extraction, a generic algorithm has also been incorporated, thereby, selecting important and relevant feature subset. Conclusive results obtained from this data set are further comprehended and interpreted in our latest research study “A Novel Parallel Classifier Scheme for Vulnerability Detection in Android” (Garg et al., 2018). This proved to be precious contribution for ensembling classifiers in machine learning to detect malware in Android. Elsevier 2018-12-15 /pmc/articles/PMC6377051/ /pubmed/30815521 http://dx.doi.org/10.1016/j.dib.2018.12.038 Text en © 2018 The Authors http://creativecommons.org/licenses/by/4.0/ This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Computer Science
Garg, Shivi
Baliyan, Niyati
Data on Vulnerability Detection in Android
title Data on Vulnerability Detection in Android
title_full Data on Vulnerability Detection in Android
title_fullStr Data on Vulnerability Detection in Android
title_full_unstemmed Data on Vulnerability Detection in Android
title_short Data on Vulnerability Detection in Android
title_sort data on vulnerability detection in android
topic Computer Science
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6377051/
https://www.ncbi.nlm.nih.gov/pubmed/30815521
http://dx.doi.org/10.1016/j.dib.2018.12.038
work_keys_str_mv AT gargshivi dataonvulnerabilitydetectioninandroid
AT baliyanniyati dataonvulnerabilitydetectioninandroid