ENGLISH
La vitrine de diffusion des publications et contributions des chercheurs de l'ÉTS
RECHERCHER

Probing AndroVul dataset for studies on Android malware classification

Téléchargements

Téléchargements par mois depuis la dernière année

Plus de statistiques...

Zakeya, Namrud, Ségla, Kpodjedo, Chamseddine, Talhi et Alvine, Boaye Belle. 2022. « Probing AndroVul dataset for studies on Android malware classification ». Journal of King Saud University - Computer and Information Sciences, vol. 34, nº 9. pp. 6883-6894.
Compte des citations dans Scopus : 2.

[thumbnail of Segla-K-2022-23527.pdf]
Prévisualisation
PDF
Segla-K-2022-23527.pdf - Version publiée
Licence d'utilisation : Creative Commons CC BY-NC-ND.

Télécharger (1MB) | Prévisualisation

Résumé

Security issues in mobile apps are increasingly relevant as this software have become part of the daily life of billions of people. As the dominant OS, Android is a primary target for ill-intentioned programmers willing to exploit its vulnerabilities by spreading malwares. Significant research has been devoted to the identification of these malwares. The current paper is an extension of our previous effort to contribute to said research with a new benchmark of Android vulnerabilities. We proposed AndroVul, a repository for Android security vulnerabilities, that builds on AndroZoo – a well-known Android app dataset – and contains data on vulnerabilities for a representative sample of about 16,000 Android apps. The present paper adds confirmed malwares from the VirusShare dataset and explores more thoroughly the effectiveness of different machine learning techniques, with respect to the classification of malicious apps. We investigated different classifiers and feature selection techniques as well as different combinations for our input data. Our results suggest that the classifier MPL is the leading classifier, with competitive results that favorably compare to recent malware detection work. Additionally, we investigate how to classify (as benign or malicious) AndroZoo apps based on the number of antivirus flags they are tagged with. We found that different thresholds only marginally affect the machine learning classifier results and that the strictest choice (i.e. one flag) performs best on the confirmed malwares from VirusShare.

Type de document: Article publié dans une revue, révisé par les pairs
Professeur:
Professeur
Kpodjedo, Sègla Jean-Luc
Talhi, Chamseddine
Affiliation: Génie logiciel et des technologies de l'information, Génie logiciel et des technologies de l'information
Date de dépôt: 15 nov. 2021 21:17
Dernière modification: 15 nov. 2022 14:28
URI: https://espace2.etsmtl.ca/id/eprint/23527

Actions (Authentification requise)

Dernière vérification avant le dépôt Dernière vérification avant le dépôt