Effective classification of android malware families through dynamic features and neural networks

39Citations
Citations of this article
32Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Due to their open nature and popularity, Android-based devices have attracted several end-users around the World and are one of the main targets for attackers. Because of the reasons given above, it is necessary to build tools that can reliably detect zero-day malware on these devices. At the moment, many of the frameworks that have been proposed to detect malware applications leverage Machine Learning (ML) techniques. However, an essential requirement to build these frameworks consists of using very large and sophisticated datasets for model construction and training purposes. Their success, indeed, strongly depends on the choice of the right features used for building a classification model providing adequate generalisation capability. Furthermore, the creation of a training dataset that well represents the malware properties and behaviour is one of the most critical challenges in malware analysis. Therefore, the main aim of this paper is proposing a new dataset called Unisa Malware Dataset (UMD) available on http://antlab.di.unisa.it/malware/, which is based on the extraction of static and dynamic features characterising the malware activities. Additionally, we will show some experiments concerning common ML tools to demonstrate how it is possible to build efficient ML-based malware classification frameworks using the proposed dataset.

References Powered by Scopus

Dissecting Android malware: Characterization and evolution

1790Citations
N/AReaders
Get full text

Learning IoT in Edge: Deep Learning for the Internet of Things with Edge Computing

1335Citations
N/AReaders
Get full text

AndroZoo: Collecting millions of Android apps for the research community

776Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Privacy-preserving malware detection in Android-based IoT devices through federated Markov chains

41Citations
N/AReaders
Get full text

An effective end-to-end android malware detection method

34Citations
N/AReaders
Get full text

Android malware category detection using a novel feature vector-based machine learning model

28Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

D’Angelo, G., Palmieri, F., Robustelli, A., & Castiglione, A. (2021). Effective classification of android malware families through dynamic features and neural networks. Connection Science, 33(3), 786–801. https://doi.org/10.1080/09540091.2021.1889977

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 5

50%

Lecturer / Post doc 2

20%

Researcher 2

20%

Professor / Associate Prof. 1

10%

Readers' Discipline

Tooltip

Computer Science 8

80%

Business, Management and Accounting 1

10%

Chemistry 1

10%

Save time finding and organizing research with Mendeley

Sign up for free