Experimental analysis of Android malware detection based on combinations of permissions and API-calls

dc.contributor.authorSingh, A.K.
dc.contributor.authorJaidhar, C.D.
dc.contributor.authorM.a, M.A.A.
dc.date.accessioned2026-02-05T09:29:43Z
dc.date.issued2019
dc.description.abstractAndroid-based smartphones are gaining popularity, due to its cost efficiency and various applications. These smartphones provide the full experience of a computing device to its user, and usually ends up being used as a personal computer. Since the Android operating system is open-source software, many contributors are adding to its development to make the interface more attractive and tweaking the performance. In order to gain more popularity, many refined versions are being offered to customers, whose feedback will enable it to be made even more powerful and user-friendly. However, this has attracted many malicious code-writers to gain anonymous access to the user’s private data. Moreover, the malware causes an increase of resource consumption. To prevent this, various techniques are currently being used that include static analysis-based detection and dynamic analysis-based detection. But, due to the enhancement in Android malware code-writing techniques, some of these techniques are getting overwhelmed. Therefore, there is a need for an effective Android malware detection approach for which experimental studies were conducted in the present work using the static features of the Android applications such as Standard Permissions with Application Programming Interface (API) calls, Non-standard Permissions with API-calls, API-calls with Standard and Nonstandard Permissions. To select the prominent features, Feature Selection Techniques (FSTs) such as the BI-Normal Separation (BNS), Mutual Information (MI), Relevancy Score (RS), and the Kullback-Leibler (KL) were employed and their effectiveness was measured using the Linear-Support Vector Machine (L-SVM) classifier. It was observed that this classifier achieved Android malware detection accuracy of 99.6% for the combined features as recommended by the BI-Normal Separation FST. © 2019, Springer-Verlag France SAS, part of Springer Nature.
dc.identifier.citationJournal of Computer Virology and Hacking Techniques, 2019, 15, 3, pp. 209-218
dc.identifier.urihttps://doi.org/10.1007/s11416-019-00332-z
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/24389
dc.publisherSpringer-Verlag France 22, Rue de Palestro Paris 75002
dc.subjectApplication programming interfaces (API)
dc.subjectClassification (of information)
dc.subjectComputer crime
dc.subjectFeature extraction
dc.subjectMalware
dc.subjectOpen source software
dc.subjectOpen systems
dc.subjectPersonal computers
dc.subjectSmartphones
dc.subjectStatic analysis
dc.subjectSupport vector machines
dc.subjectAndroid
dc.subjectAndroid applications
dc.subjectExperimental analysis
dc.subjectLinear Support Vector Machines
dc.subjectMalware detection
dc.subjectMutual informations
dc.subjectResource consumption
dc.subjectSelection techniques
dc.subjectAndroid (operating system)
dc.titleExperimental analysis of Android malware detection based on combinations of permissions and API-calls

Files

Collections