ANDROID MALWARE CLASSIFICATION USING BASIC MACHINE LEARNING METHODS
Abstract
Keywords
Android Malware , Goodware , Classification , Machine Learning , Random Forest
Kaynakça
- “Smartphone OS market share 2023”, 2024, https://www.idc.com/promo/smartphone-market-share.
- “Statista, Number of available applications in the Google Play Store from December 2009 to June 2023”, 2024, https://www.statista.com/statistics/266210/number-of-available-applications-in-the-google-play-store.
- Li, J., Sun, L., Yan, Q., Li, Z., Srisa-An, W., & Ye, H. (2018). Significant permission identification for machine-learning-based android malware detection. IEEE Transactions on Industrial Informatics, 14(7), 3216-3225.
- “Tom’sguide”, 2024, https://www.tomsguide.com/news/over-400-million-infected-with-android-spyware-delete-these-apps-right-now.
- Ngo, F. T., Agarwal, A., Govindu, R., & MacDonald, C. (2020). Malicious software threats. The Palgrave Handbook of International Cybercrime and Cyberdeviance, 793-813.
- Sahs, J., & Khan, L. (2012, August). A machine learning approach to android malware detection. In 2012 European intelligence and security informatics conference (pp. 141-147). IEEE.
- Yerima, S. Y., Sezer, S., & Muttik, I. (2014, September). Android malware detection using parallel machine learning classifiers. In 2014 Eighth international conference on next generation mobile apps, services and technologies (pp. 37-42). IEEE.
- Wen, L., & Yu, H. (2017, August). An Android malware detection system based on machine learning. In AIP conference proceedings (Vol. 1864, No. 1). AIP Publishing.
- Kakavand, M., Dabbagh, M., & Dehghantanha, A. (2018, November). Application of machine learning algorithms for android malware detection. In Proceedings of the 2018 International Conference on Computational Intelligence and Intelligent Systems (pp. 32-36).
- Li, J., Sun, L., Yan, Q., Li, Z., Srisa-An, W., & Ye, H. (2018). Significant permission identification for machine-learning-based android malware detection. IEEE Transactions on Industrial Informatics, 14(7), 3216-3225.