A novel feature selection technique: Detection and classification of Android malware

IF 5 3区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE
Sandeep Sharma , Prachi , Rita Chhikara , Kavita Khanna
{"title":"A novel feature selection technique: Detection and classification of Android malware","authors":"Sandeep Sharma ,&nbsp;Prachi ,&nbsp;Rita Chhikara ,&nbsp;Kavita Khanna","doi":"10.1016/j.eij.2025.100618","DOIUrl":null,"url":null,"abstract":"<div><div>Android operating system is not just the most commonly employed mobile operating system, but also the most lucrative target for cybercriminals due to its extensive user base. In light of this, the objective of this research is to uncover a few features that can significantly enhance the detection of Android malware through utilization of feature engineering. This work introduces a novel approach to feature selection that can discover a promising subset of features for effective malware detection. The proposed technique, Multi-Wrapper Hybrid Feature Selection Technique (MWHFST), integrates wrapper-based feature selection techniques to address the limitations of individual wrapper-based feature selection methods. The research employs extensive experiments on the Kronodroid dataset, a comprehensive and large-scale dataset, to gauge how well the proposed technique identifies and classifies malicious Android applications. Experimental results using machine learning algorithms demonstrate that the technique proposed in this research effectively integrates the advantages of individual feature selection techniques and exhibits the potential to identify a brief set of pivotal features for detecting Android malware. The proposed approach successfully identifies and categorizes malicious Android applications, achieving an accuracy of 98.8 % and 88 %, respectively, using only 31 features. This approach surpasses existing methods by delivering comparable performance with a significantly reduced number of features compared to individual approaches.</div></div>","PeriodicalId":56010,"journal":{"name":"Egyptian Informatics Journal","volume":"29 ","pages":"Article 100618"},"PeriodicalIF":5.0000,"publicationDate":"2025-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Egyptian Informatics Journal","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1110866525000118","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0

Abstract

Android operating system is not just the most commonly employed mobile operating system, but also the most lucrative target for cybercriminals due to its extensive user base. In light of this, the objective of this research is to uncover a few features that can significantly enhance the detection of Android malware through utilization of feature engineering. This work introduces a novel approach to feature selection that can discover a promising subset of features for effective malware detection. The proposed technique, Multi-Wrapper Hybrid Feature Selection Technique (MWHFST), integrates wrapper-based feature selection techniques to address the limitations of individual wrapper-based feature selection methods. The research employs extensive experiments on the Kronodroid dataset, a comprehensive and large-scale dataset, to gauge how well the proposed technique identifies and classifies malicious Android applications. Experimental results using machine learning algorithms demonstrate that the technique proposed in this research effectively integrates the advantages of individual feature selection techniques and exhibits the potential to identify a brief set of pivotal features for detecting Android malware. The proposed approach successfully identifies and categorizes malicious Android applications, achieving an accuracy of 98.8 % and 88 %, respectively, using only 31 features. This approach surpasses existing methods by delivering comparable performance with a significantly reduced number of features compared to individual approaches.
求助全文
约1分钟内获得全文 求助全文
来源期刊
Egyptian Informatics Journal
Egyptian Informatics Journal Decision Sciences-Management Science and Operations Research
CiteScore
11.10
自引率
1.90%
发文量
59
审稿时长
110 days
期刊介绍: The Egyptian Informatics Journal is published by the Faculty of Computers and Artificial Intelligence, Cairo University. This Journal provides a forum for the state-of-the-art research and development in the fields of computing, including computer sciences, information technologies, information systems, operations research and decision support. Innovative and not-previously-published work in subjects covered by the Journal is encouraged to be submitted, whether from academic, research or commercial sources.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信