Deep learning feature exploration for Android malware detection

Nan Zhang, Yu an Tan, Chen Yang, Yuanzhang Li*

*此作品的通讯作者

科研成果: 期刊稿件文章同行评审

64 引用 (Scopus)
Plum Print visual indicator of research metrics
  • Citations
    • Citation Indexes: 63
  • Captures
    • Readers: 138
see details

摘要

Android mobile devices and applications are widely deployed and used in industry and smart city. Malware detection is one of the most powerful and effective approaches to guarantee security of Android systems, especially for industrial platform and smart city. Recently, researches using machine learning-based techniques for Android malware detection increased rapidly. Nevertheless, most of the appeared approaches have to perform feature analysis and selection, so-called feature engineering, which is time-consuming and relies on artificial experience. To solve the inefficiency problem of feature engineering, we propose TC-Droid, an automatic framework for Android malware detection based on text classification method. The core idea of TC-Droid is derived from the field of text classification. TC-Droid feeds on the text sequence of APPs analysis reports generated by AndroPyTool, applies a convolutional neural network (CNN) to explore significant information (or knowledge) under original report text, instead of manual feature engineering. In an evaluation with different number of real-world samples, TC-Droid outperforms state-of-the-art model (Drebin) and several classic models (NB, LR, KNN, RF) as well. With multiple experimental settings and corresponding comparisons, TC-Droid achieves effective and flexible performance in Android malware detection task.

源语言英语
文章编号107069
期刊Applied Soft Computing
102
DOI
出版状态已出版 - 4月 2021

指纹

探究 'Deep learning feature exploration for Android malware detection' 的科研主题。它们共同构成独一无二的指纹。

引用此

Zhang, N., Tan, Y. A., Yang, C., & Li, Y. (2021). Deep learning feature exploration for Android malware detection. Applied Soft Computing, 102, 文章 107069. https://doi.org/10.1016/j.asoc.2020.107069