使用机器学习技术检测智能手机允许的安全漏洞

Atul Kumar, Ishu Sharma
{"title":"使用机器学习技术检测智能手机允许的安全漏洞","authors":"Atul Kumar, Ishu Sharma","doi":"10.1109/WCONF58270.2023.10234970","DOIUrl":null,"url":null,"abstract":"Attackers may target cell phones by taking advantage of the rights given to installed applications. Users frequently have to provide application permission when they download and install it on their smartphones. This experimental study concentrates on the identification of permissioned malware assaults in smartphone security breaches using machine learning approaches. In order to uncover security flaws in smartphones, the study compares the effectiveness of three widely used machine learning algorithms: Naive Bayes, K-nearest neighbor, and Decision Tree. Each method was trained and evaluated using the pre-processed data and then divided into training, and testing sets. The study evaluated trained and tested algorithm’s accuracy, precision, recall, and F1 score so that machine learning techniques can be deployed for detecting permissioned malware attack. The results prove that the technique Decision Tree Classifier is performing overall better in comparison with other chosen techniques for spotting security flaws in cellphones. Performance indicators for Naive Bayes were lower than those for the other two algorithms. This study offers insightful information about how well machine learning algorithms can execute early detection of permissioned malware attacks on smartphones, and it can be utilized as a model for creating secure smartphone defenses.","PeriodicalId":202864,"journal":{"name":"2023 World Conference on Communication & Computing (WCONF)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Detection of Smartphone Permissioned Security Breaches using Machine Learning Techniques\",\"authors\":\"Atul Kumar, Ishu Sharma\",\"doi\":\"10.1109/WCONF58270.2023.10234970\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Attackers may target cell phones by taking advantage of the rights given to installed applications. Users frequently have to provide application permission when they download and install it on their smartphones. This experimental study concentrates on the identification of permissioned malware assaults in smartphone security breaches using machine learning approaches. In order to uncover security flaws in smartphones, the study compares the effectiveness of three widely used machine learning algorithms: Naive Bayes, K-nearest neighbor, and Decision Tree. Each method was trained and evaluated using the pre-processed data and then divided into training, and testing sets. The study evaluated trained and tested algorithm’s accuracy, precision, recall, and F1 score so that machine learning techniques can be deployed for detecting permissioned malware attack. The results prove that the technique Decision Tree Classifier is performing overall better in comparison with other chosen techniques for spotting security flaws in cellphones. Performance indicators for Naive Bayes were lower than those for the other two algorithms. This study offers insightful information about how well machine learning algorithms can execute early detection of permissioned malware attacks on smartphones, and it can be utilized as a model for creating secure smartphone defenses.\",\"PeriodicalId\":202864,\"journal\":{\"name\":\"2023 World Conference on Communication & Computing (WCONF)\",\"volume\":\"151 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-07-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 World Conference on Communication & Computing (WCONF)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WCONF58270.2023.10234970\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 World Conference on Communication & Computing (WCONF)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WCONF58270.2023.10234970","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

攻击者可以利用已安装应用程序的权限来攻击手机。用户在智能手机上下载和安装应用程序时,通常需要提供应用程序许可。本实验研究集中于使用机器学习方法识别智能手机安全漏洞中允许的恶意软件攻击。为了发现智能手机的安全漏洞,该研究比较了三种广泛使用的机器学习算法的有效性:朴素贝叶斯、k近邻和决策树。每种方法使用预处理数据进行训练和评估,然后分为训练集和测试集。该研究评估了经过训练和测试的算法的准确性、精密度、召回率和F1分数,以便可以部署机器学习技术来检测允许的恶意软件攻击。结果证明,决策树分类器技术在发现手机安全漏洞方面比其他选择的技术总体上表现更好。朴素贝叶斯算法的性能指标低于其他两种算法。这项研究提供了关于机器学习算法在智能手机上执行许可恶意软件攻击的早期检测方面的深刻信息,并且它可以用作创建安全智能手机防御的模型。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Detection of Smartphone Permissioned Security Breaches using Machine Learning Techniques
Attackers may target cell phones by taking advantage of the rights given to installed applications. Users frequently have to provide application permission when they download and install it on their smartphones. This experimental study concentrates on the identification of permissioned malware assaults in smartphone security breaches using machine learning approaches. In order to uncover security flaws in smartphones, the study compares the effectiveness of three widely used machine learning algorithms: Naive Bayes, K-nearest neighbor, and Decision Tree. Each method was trained and evaluated using the pre-processed data and then divided into training, and testing sets. The study evaluated trained and tested algorithm’s accuracy, precision, recall, and F1 score so that machine learning techniques can be deployed for detecting permissioned malware attack. The results prove that the technique Decision Tree Classifier is performing overall better in comparison with other chosen techniques for spotting security flaws in cellphones. Performance indicators for Naive Bayes were lower than those for the other two algorithms. This study offers insightful information about how well machine learning algorithms can execute early detection of permissioned malware attacks on smartphones, and it can be utilized as a model for creating secure smartphone defenses.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信