Cargando…
AndroAnalyzer: android malicious software detection based on deep learning
BACKGROUND: Technological developments have a significant effect on the development of smart devices. The use of smart devices has become widespread due to their extensive capabilities. The Android operating system is preferred in smart devices due to its open-source structure. This is the reason fo...
Autor principal: | |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
PeerJ Inc.
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8157142/ https://www.ncbi.nlm.nih.gov/pubmed/34084934 http://dx.doi.org/10.7717/peerj-cs.533 |
_version_ | 1783699614908547072 |
---|---|
author | Arslan, Recep Sinan |
author_facet | Arslan, Recep Sinan |
author_sort | Arslan, Recep Sinan |
collection | PubMed |
description | BACKGROUND: Technological developments have a significant effect on the development of smart devices. The use of smart devices has become widespread due to their extensive capabilities. The Android operating system is preferred in smart devices due to its open-source structure. This is the reason for its being the target of malware. The advancements in Android malware hiding and detection avoidance methods have overridden traditional malware detection methods. METHODS: In this study, a model employing AndroAnalyzer that uses static analysis and deep learning system is proposed. Tests were carried out with an original dataset consisting of 7,622 applications. Additional tests were conducted with machine learning techniques to compare it with the deep learning method using the obtained feature vector. RESULTS: Accuracy of 98.16% was achieved by presenting a better performance compared to traditional machine learning techniques. Values of recall, precision, and F-measure were 98.78, 99.24 and 98.90, respectively. The results showed that deep learning models using trace-based feature vectors outperform current cutting-edge technology approaches. |
format | Online Article Text |
id | pubmed-8157142 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | PeerJ Inc. |
record_format | MEDLINE/PubMed |
spelling | pubmed-81571422021-06-02 AndroAnalyzer: android malicious software detection based on deep learning Arslan, Recep Sinan PeerJ Comput Sci Artificial Intelligence BACKGROUND: Technological developments have a significant effect on the development of smart devices. The use of smart devices has become widespread due to their extensive capabilities. The Android operating system is preferred in smart devices due to its open-source structure. This is the reason for its being the target of malware. The advancements in Android malware hiding and detection avoidance methods have overridden traditional malware detection methods. METHODS: In this study, a model employing AndroAnalyzer that uses static analysis and deep learning system is proposed. Tests were carried out with an original dataset consisting of 7,622 applications. Additional tests were conducted with machine learning techniques to compare it with the deep learning method using the obtained feature vector. RESULTS: Accuracy of 98.16% was achieved by presenting a better performance compared to traditional machine learning techniques. Values of recall, precision, and F-measure were 98.78, 99.24 and 98.90, respectively. The results showed that deep learning models using trace-based feature vectors outperform current cutting-edge technology approaches. PeerJ Inc. 2021-05-10 /pmc/articles/PMC8157142/ /pubmed/34084934 http://dx.doi.org/10.7717/peerj-cs.533 Text en © 2021 Arslan https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. |
spellingShingle | Artificial Intelligence Arslan, Recep Sinan AndroAnalyzer: android malicious software detection based on deep learning |
title | AndroAnalyzer: android malicious software detection based on deep learning |
title_full | AndroAnalyzer: android malicious software detection based on deep learning |
title_fullStr | AndroAnalyzer: android malicious software detection based on deep learning |
title_full_unstemmed | AndroAnalyzer: android malicious software detection based on deep learning |
title_short | AndroAnalyzer: android malicious software detection based on deep learning |
title_sort | androanalyzer: android malicious software detection based on deep learning |
topic | Artificial Intelligence |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8157142/ https://www.ncbi.nlm.nih.gov/pubmed/34084934 http://dx.doi.org/10.7717/peerj-cs.533 |
work_keys_str_mv | AT arslanrecepsinan androanalyzerandroidmalicioussoftwaredetectionbasedondeeplearning |