0% found this document useful (0 votes)
23 views7 pages

Ijatcse 46915 SL 2020

Uploaded by

Vaishnavi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views7 pages

Ijatcse 46915 SL 2020

Uploaded by

Vaishnavi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

ISSN 2278-3091

Nuren Natasha Maulat Nasri et al., International Journal ofVolume 9,Trends


Advanced No.1.5, 2020
in Computer Science and Engineering, 9(1.5), 2020, 327 – 333
International Journal of Advanced Trends in Computer Science and Engineering
Available Online at http://www.warse.org/IJATCSE/static/pdf/file/ijatcse4691.52020.pdf
https://doi.org/10.30534/ijatcse/2020/4691.52020

Android Malware Detection System using Machine Learning


Nuren Natasha Maulat Nasri1, Mohd Faizal Ab Razak1*, RD Rohmat Saedudin2,
Salwana Mohamad@Asmara1, Ahmad Firdaus1
1
Faculty of Computing, Universiti Malaysia Pahang, Malaysia, [email protected]
2
School of Industrial Engineering,Telkom University,40257 Bandung West Java, Indonesia, [email protected]

attacker that might spread the malware that makes the system
ABSTRACT act differently than it is supposed to behave. The malware
During the past year until now, the amount of malware usually sent such fraudulent message and charge the user for
targeting Android operating system has been rising their fake services.
dramatically. Therefore, Android malware detection are
required to detect the malware before getting more serious. According to the Security Threat Report released by
The static analysis examines the full code of application Symantec in 2018 [12], the overall target activities that
meticulously while dynamic analysis identifies the malware attacked is up by 10 percent in 2017. In fact, by March 12,
applications by monitoring it behaviors. This study proposed 2018, there are 4, 964, 460 devices infected by RottenSys
a malware detection system by using machine learning malware [4]. This situation desperately needs to find a
approach and aims to detect malware that has attacked potential method to detect malware before it harmed more
Android operating system. In this research paper, the Android Android smartphones. In this era globalization, people
malware detection system are trained using five types of commonly used smartphones in such many ways like using a
classifiers meanwhile WEKA is used for simulation process. network connection to interact with the world. For example,
The dataset used contains 10k of malware and 10k of benign. online shopping, online banking, and cloud storage. Naturally,
The outcomes presented Random Forest classifiers attained there are also has disadvantages by using this kind of network
highest accuracy result, 89.36% compared to Naïve Bayes connections towards the user. Like example, the storing of
which 89.2%. TPR is viewed as detection rate which precisely confidential information in smartphones might attract the
predicted malware process while FPR is choosed as detection attacker to use dirty things in order to get user details like
rate which inaccurately predicted normal as malware. To spreading malware towards some software or applications that
evaluate detection exactness which is good or bad, the area might be installed in their smartphones either they realized or
under the curve (AUC) have been applied through this study. not especially for Android users.
The results show that Naïve Bayes has the lowest model
complexity as it uses minimal time to build the model. Hence, Besides, there are many kinds of existing research that had
it can be concluded that achieving reasonable accuracy and been proposed to detect the malware by using various types of
effectiveness in classifying unknown malware helps to techniques and methods that implement into the application.
determine the performance of the classifiers. For example, Google published an automated scan system for
potential malware which is called as Bouncer application [8].
Key words: Android, Intrusion, Machine Learning, Malware. However, there is still has room for improvement of Android
malware detection. The reason is the different type of method
1. INTRODUCTION and techniques will come out with a different rate of error
results.
Here Nowadays, the usage of mobile devices or smartphones
has increasing in our daily and almost all of the people around Furthermore, there is still some false alarm occurred on
world own a smartphone. According to Global market share, Android devices that tricked the user. For example, there are
during second quarter of 2018, there was 88% smartphones in 600,000 of Android user that have been downloaded the fake
the market have been sold towards end users and that is guide applications such as Pokemon Go and FIFA mobile.
Android systems [13]. This is because, they are mistakenly downloaded the malware
application when they want to seek the guide for the games
Besides, it is becoming more and more popular because of its [14]. These prove that not all the techniques have been
portability and convenient to use. For an example, the successfully developed in order to give protection for Android
smartphone contains various types of functions and services smartphones. Hence, the lead contributions of this research as
like it can hold the personal information and access files that follow:
usually been stored in the cloud such as bank account
information, email details, password and it also allows the i. To review current issue related to the Android malware
user to interact with each other by sending a message or call. detection system.
However, with the growth of the Android mobile popularity
has brought many security concerns and threats from the ii. The evaluation study applied machine learning approach
has improved the malware detection system.

327
Nuren Natasha Maulat Nasri et al., International Journal of Advanced Trends in Computer Science and Engineering, 9(1.5), 2020, 327 – 333

iii. To evaluate propose of the system in terms of accuracy engineering technique to detect the android malware
of malware detection. detection. The authors focused on static approach based on an
automatic analysis of decompiled mobile application codes.
The rest of this paper are sorted as follows. The Section 2 In this research, the unique feature vector derived from Java
discuss about related work that have been used by previous code application was build. There are 696 number of features.
researcher. Meanwhile, Section 3 explained the details about
The authors divided them within three categories which are
the research method during experiment and Section 4
model implementation of onReceive() methods for
evaluates the successfulness in detecting the malware. Lastly,
section 5 is the conclusion and future work of this paper. BroadcastReceiver component. There are also commands
group that obtain administrative access to the device, expand
the opportunities of attack and hide the operation of malware
2. RELATED WORK on that devices. Based on the selected basis [5] the API Calls
contains the largest group of features which is 616.
Machine learning mainly known as an artificial intelligence
(AI) application that provide the system potentiality to
The second research by [2] also use the machine learning
automatically learn and upgrade experience without being
technique in their research to improve Android malware
program explicitly. Therefore, the machine learning approach
detection using big data of analytics. The author provided a
can provide a solution to improve the decision-making
comparison of seven different machine learning classifiers on
process [9]. Recently, machine learning approach have been
the SherLock dataset [19] which is one of the largest datasets
used to perform the decision-making task such as text-based
of Android malware. Using 35 GB of dataset and 17 node
on sentiment analysis and pattern recognition, detecting the
Spark cluster, the authors comparing the different classifiers
malware, network intrusion detector and etc. [3][25][26].
including Logistic Regression, Isotonic Regression, Random
There are some machine learning methods as stated in [21].
Forest, Gradient Boosted Trees, Decision Trees, Support
• Supervised machine learning algorithms able to predict the Vector Machine (SVM), and Multilayer Perceptron. Besides,
upcoming events by soliciting the things from the previous they observed the tree based on techniques provide better
learning to the new data using labeled examples. By using result in general. Moreover, Gradient boosted trees provided
this learning, inferred function can be produced to make approximately 91% precision and it is the highest among all
prediction about the output values which is training dataset the seven techniques. The authors also compared the FPR in
after analysis. Besides, this algorithm also able to compare detecting benign applications and observed that the gradient
the output with the exact one, intended output and find error boosted tree techniques have lowest false positive.
to adjust the model accordingly. Furthermore, they deployed their trained model on private
• Meanwhile for unsupervised machine learning algorithms, it cloud to facilitate the malware application detection in
trained the information neither classified nor labeled. This real-time. Therefore, the authors envisioned that a service
algorithm study how systems can infer the function to relate could be extremely useful for the communities.
with the hidden structure from unlabeled data. Moreover,
the system explores the data and draw the inferences from In the third research by [17] the main purposes are to solve the
datasets to express the unlabeled data hidden structures problem about malware detection depends on the network
without figure out the exact output. monitoring instead using static approaches by analyzing the
• Semi-supervised machine learning algorithms fall different network-based detection solutions that engaged the
somewhere in between supervised and unsupervised machine learning techniques and proposes enhancements to
learning because labeled and unlabeled will be used to train detect the malware precisely. The evaluation process consists
the data. two stages which are performing experiments and analysis.
• Reinforcement machine learning algorithms interacted with The experiment executes three sub stages such as data
its environment by making actions and locates the errors. collection, machine learning classifiers and feature selection
This method permitted the machines and software agents to and extraction. During data collection stage, network traffic
involuntary determine ideal behavior within specific context for benign and malicious applications was captured.
to maximize their performances. The existing studies of malware detection system used a
dataset, features, precision and etc. to calculate either the
malware is existed or not in the system. Despite that, none of
Machine learning authorize an analysis of huge amount of the existing machine learning system can give permission to
data. Besides, it mainly distributes the correct results faster to prevent the malware from entering their system. Therefore,
recognize the profitable chances or dangerous threat. In this research would like to improve an existing system by
addition, it required additional time and resources to train giving permission to certain software that cleared from the
correspondingly [22] By combining machine learning malicious code in it. Meanwhile, for the software that contains
between AI with cognitive technologies can make it more malware in it, the system would not give any permission from
productive in measuring information in large values. entering the system.
secondary
During first research by [18] use machine learning and reverse

328
Nuren Natasha Maulat Nasri et al., International Journal of Advanced Trends in Computer Science and Engineering, 9(1.5), 2020, 327 – 333

3. RESEARCH METHOD

This section describes details techniques, approaches, and


features applied during this research along with the
methodology that will be used in carrying out the experiment.
Fig.1 presented major components of malware detection
system. There are three parts in these architectures which are
collection of data, machine learning and the database itself.
Each of phases are related to each other. The data collection
process started by gather all permission of benign and
malware applications. This process involves decompiling of
.apk file, extract and filter permission. The permissions will Figure 2: Data Collection Phase
be collected and store into a readable format as a .arff file. The
a .arff file own every attributes of the features that will be used
in features optimization approach to exclude the noise and 3.2 Decompiling APK File
irrelevance contains in the dataset [15]. AndroidManifest.xml file uses to get essential information
like permission and activities of application information. All
the permission that has been extracted needs to be saved as
x.arff file and loaded in WEKA. Meanwhile, the permission
values stored as binary number (0 or 1). Moreover, the
optimization feature is used to help in gaining the best features
of permissions.
The permission features of malware detection were trained
and classified by using significant features. This study applied
the features selection to get an outstanding feature for the best
malware detection. Features selection methods identified and
removed unsuitable or unnecessary attributes data that
cannnot contribute towards any preciseness of predictive
model [20] [23]. Hence, number of malware features was
reduced from the Top 20 permission to Top 15 permission.
This is to make sure there is a unique pattern between the
Figure 1: Android Malware Architecture
benign and malware. This study also applied tenfold
3.1 Data Collection Phase cross-validation approaches which being run frequently for
The data collection process required benign and malware ten times. Table 1 presented the permission features list that
applications datasets in. apk file. During this phase, the have been used by this study.
random samples are drawn from AndroZoo datasets. The 3.2 Machine Learning Classifier
AndroZoo collected an executable of Android application
Machine learning is artificial intelligence (AI) type that can
from many sources and made the analysis available through it
learn without using explicit programming. It is capable of
[16]. Besides, the dataset was confined to the applications that
predicting future and improving decisions when revelead to
have been drawn from the Google Play. Furthermore, the
new data. Prediction process usually based on the search
Bouncer detection that have been implemented in Google
through data set that look for patterns and referred as learning.
Play are able to remove malware applications that bring harm
The learning process and prediction results depends on its
towards their users. Therefore, by downloading the
classifier types. This technique widely used to classify
applications that came from Google Play is more accurate
samples particularly in intrusion detection systems (benign
since it typically used to produce for the dataset of benign
and malware) area. The two commons type of machine
applications [11]. The processes of collection of data are
learning are supervised and unsupervised [24]. Supervised
illustrated as shown in Figure 2.
machine learning approach have been applied in the research
since the sample data set contains the labels (benign and
malware).

329
Nuren Natasha Maulat Nasri et al., International Journal of Advanced Trends in Computer Science and Engineering, 9(1.5), 2020, 327 – 333

Table 1: Attributes of Cleveland dataset through weighted connections [6].


Abbreviation Fullname
ACCESS_WI Allow Wi-Fi networks information to be J48: Known as ID3 extension. The additional features of J48
FI_STATE access by applications. account for continuous range values, the trimming of decision
ADD_VOICE Able any voicemail to be add by the trees, missing values and rules derivation. J48 is known as
MAIL applications into the system. open source of Java in data mining tool Realization of the
GET_ACCO Allow the account list in the Accounts C4.5 algorithm (WEKA).
UNTS Service to be access.
GET_TASKS Allow the app to recover information the DecisionTable: Concise the visual representation to specify
current and new running tasks. which actions need to conduct depends on its condition. The
INSTALL_S Allow shortcut to be install by application information conveyed the decision tables can represent as
HORTCUT in Launcher. decision trees or a series if-then-else and switch-case
MEDIA_CO Allow the applications to know the statements of programming language.
NTENT_CO playing content and control its playback.
NTROL Naïve Bayes: An algorithm that used Bayes' theorem to
MOUNT_UN Allow mounting and unmounting files classify an object. Naive Bayes classifiers assumed naïve or
MOUNT_FIL system for removable storage. strong independence between data points attribute. Naive
ESYSTEMS Bayes classifiers is trendy for its text classification and
NFC Allow I/O operations to be perfrom by I/O traditional solution for spam detection problem.
over the NFC.
READ_PHO Allow read only to phone state, phone
NE_STATE number, any ongoing calls status, current
cellular network information and all the
list of Phone Accounts registered on the
device.
SET_ALAR Allow the Intent to be broadcast by
M application for alarm.
SYSTEM_AL Allow the windows to be create by
ERT_WINDO applications using type
W WindowManager.LayoutParams. Figure 3: Machine Learning Phase
TYPE_APPLICATION_OVERLAY on
top of the other apps. 4. RESULTS AND ANALYSIS
WRITE_EXT Allow the external storage to be write
ERNAL_STO from applications. This chapter will discuss about experiments that have been
RAGE conducted for Android malware detection system using
ACCESS_FI Allow the specific location to be access by machine learning. Besides, initial outcome shows the results
NE_LOCATI applications. obtained from Random Forest, Naïve Bayes, J48, Decision
ON Table and MLP. This study also used parameters of accuracy,
FPR, precision, recall and f-measure to investigate the
ACCESS_CO Allow the approximate location to be
different measurements of each classifier. The outcomes
ARSE_LOCA access by applications.
achieved from 15 permission features of testing set which
TION
used five selected classifiers as in Table 2.
CHANGE_W Allow the changes of state of Wi-Fi
IFI_STATE connectivity by using applications. Table 2: Performance from each classifier
Moreover, supervised machine learning offered fine result
through error reduction. During research, the five classifiers Classifie Accura FPR Precisi Recall F-me
have been implemented to perceive every particular results rs cy on asure
account in different types of machine learning classifiers. The (%)
five classifiers are Random Forest (RF), J48, Multi-Layer Random 89.36 10.64 89.4 89.4 89.4
Perceptron (MLP), DecisionTable and Naïve Bayes. Forest
Naïve 86.03 13.97 86.0 86.0 86.0
Random Forest (RF): Well-known method of collective Bayes
learning for supervised classification or regression. This J48 89.18 10.82 89.2 89.2 89.2
machine learning technique worked by building random set of Decision 89.13 10.87 89.1 89.1 89.1
decision trees during training and producing the classes which Table
mean the prediction (regression) of an individual trees or class MLP 89.12 10.88 89.1 89.1 89.1
mode (classification) [7]. 4.1 Comparative Analysis
MLP: Multi-layer perceptron is the artificial neural network The outcomes show Random Forest classifiers attained the
model. It consisted multiple node layers that interacting accurateness result, 89.36% compared to Naïve Bayes which

330
Nuren Natasha Maulat Nasri et al., International Journal of Advanced Trends in Computer Science and Engineering, 9(1.5), 2020, 327 – 333

achieved only 89.2%. This determine that Random Forest


classifiers is better than other classifiers in detecting the
malware. The features selection also played a critical part in
deciding the effectiveness of android malware detection. Fig.4
shows that the approach able to detect an unknown malware
with over 89% rate of accuracy.

Figure 5: ROC Curve


The vertical axis in figure above shows the detection rate
while horizontal axis shows error detection rate. Five lines
represented ROC curve for each machine learning classifiers.
Furthermore, ROC curve is not easy to compare due the
similarities under the same conditions. Meanwhile, AUC used
to calculate the accuracy of detection which resulted good or
bad such as in table below. Therefore, area of 1 indicated the
perfect prediction and area of 0.5 indicated a bad prediction.
Figure 4: Percentage Accuracy Table 4: AUC results
Confusion matrix technique summarized the classifications of
model performance. Table below presented the possible Classifiers AUC Prediction
classes of prediction, benign and malware. Like an example, if Random Forest 0.949 Perfect
the model forecast the existence of any malware activities, the Prediction
outcomes will appear as “malware” and vice versa. Therefore, Naïve Bayes 0.928 Perfect
five classifiers performance has been presented as Table Prediction
3.Table 3 expressed the study produced the best outcomes by J48 0.921 Perfect
Prediction
predicting a malware of 8741 from J48 classifiers. Meanwhile DecisionTable 0.943 Perfect
incorrectly predicted perspective revealed that J48 got the Prediction
slightest value. Therefore, J48 classifiers capable to predict MLP 0.948 Perfect
malware more precisely. Based on the permission features in Prediction
this study, the process is classified as benign and malware.
Besides, the receiver operating characteristics (ROC) curve
for each of machine learning classifiers also being calculated.
During this stage, TPR is counted as detection rate which
exactly predicted process of malware while FPR is choose as
the detection rate which inaccurately predicted normal as Table 5: Time taken to produce model (seconds) Classifiers Build
model
malware. The curves of five machine learning classifiers have
been presented as figure below.
Classifier AUC
Table 3: Confusion Matrix of classifiers
Random Forest 8.44
Naïve Bayes 0.18
J48 1.03
Classifiers Actual Prediction
DecisionTable 2.89
Benign Malware
Random Forest Actual Benign 9159 841 MLP 30.43

Actual Malware 1288 8712 Table 5 presented the time taken to produce results in second.
The results show that Naïve Bayes has the lowest model
Naïve Bayes Actual Benign 9135 865 complexity as it uses minimal time to build the model. Hence,
Actual Malware 1929 8071 it can be concluded that to achieve reasonable accuracy and
J48 Actual Benign 9095 905
effectiveness in classifying unknown malware as it helps to
Actual Malware 1259 8741
Decision Table Actual Benign 9126 874
determine the performance of the classifiers.
Actual Malware 1300 8700
MLP Actual Benign 9100 900 After completing the experiments, the findings of the study
Actual Malware 1276 8724 show that machine learning able to produce the most accurate
detection using five types of machine learning classifiers. The
obtained results from previous research paper seems to be
agreed that machine learning provides the best result in
prediction. Based on this experiment, the result from
analyzing the permission features of dataset provide better

331
Nuren Natasha Maulat Nasri et al., International Journal of Advanced Trends in Computer Science and Engineering, 9(1.5), 2020, 327 – 333

result compared to other result because using machine


learning classifiers are more accurate to analyses and train the The process required further exploration to investigate the
large of dataset. Based on the obtained result also it shows that correlation between malware and benign applications. This
Random Forest classifiers able to produce the most accurate will reduce False Alarms; hence it increases the detection
detection result. Meanwhile, J48 also capable to produce accuracy. This study also can be done by using Dynamic
result nearly with the target result but it is not accurate as Analysis approach. It able to identify the vulnerabilities
Random Forest. Meanwhile the Decision Table and MLP during runtime environment.
produced the same result obtained. The less accurate data is
Naïve Bayes. ACKNOWLEDGEMENT
5. CONCLUSION The work is funded by the Ministry of Higher Education
A conclusion might elaborate on the importance of the work FRGS Racer under Project ID:
or suggest applications and extensions. As conclusion, this RACER/1/2019/ICT03/UMP//2 and UIC 190807.
study has summarized in details about the development and
methodology for Android malware detetion. The machine REFERENCES
learning classifiers used in identifying the reliable features 1. F.-X. Geiger and I. Malavolta, “Datasets of Android
permission to get an accurate detection process during the Applications: a Literature Review,” 2018, [Online].
process. Besides, this study appraised many machine learning Available: https://arxiv.org/pdf/1809.10069.pdf.
classifiers types that able enhancing the performance of 2. L. U. Memon, N. Z. Bawany, and J. A. Shamsi, “A
Android malware detection. During this study, the large comparison of machine learning techniques for android
training samples been extracted and successfully identified malware detection using apache spark,” J. Eng. Sci.
the better potential classifiers. Besides, 10k benign and 10k Technol., vol. 14, no. 3, pp. 1572–1586, 2019.
malware of data were being analyzed by five types of 3. “Machine Learning What it is and why it matters,” SAS,
classifiers. It is very important to know the most suitable data 2019..https://www.sas.com/it_it/insights/analytics/machi
that can leads to most accurate result in detect the malware ne-learning.html
using machine learning. 4. Feixiang He, Bohdan Melnykov, and Elena Root,
“RottenSys: Not a Secure Wi-Fi Service At All,” Check
A set of real benign and Android malware data sample Point Research, 2018..
applications were used during this experiment. Moreover, https://research.checkpoint.com/2018/rottensys-not-secu
static analysis technique act as classifier in order to re-wi-fi-service/
differentiate data sample between benign and malware 5. S. Seo et al., “Mobile Malware Threats and Defenses for
Homeland Security To cite this version : HAL Id :
applications. Besides, the process of machine learning
hal-01542454 Mobile Malware Threats and Defenses for
comprised three stages which are features optimization,
Homeland Security,” 2017.
trained classifiers and machine learning classifiers evaluation.
6. F. A. Narudin, A. Feizollah, N. B. Anuar, and A. Gani,
“Evaluation of machine learning classifiers for mobile
The outcomes indicated 89.36% detection rates of TPR using malware detection,” Soft Comput., vol. 20, no. 1, pp.
Random Forest classifiers on the samples of Drebin malware. 343–357, 2016.
The results obtained shows that using machine learning 7. F. Vanhoenshoven, G. Napoles, R. Falcon, K. Vanhoof,
approach can reach high accuracy of detection rate and and M. Koppen, “Detecting malicious URLs using
indicate its efficiency. This can prove that machine learning machine learning techniques,” 2016 IEEE Symp. Ser.
classifiers are capable in detecting the Android malware. In Comput. Intell. SSCI 2016, no. December, 2017
conclusion, the improvement of features optimization and 8. Gregg Keizer, “Google reveals Android malware
learning classifiers can continuously derive to get the greatest ‘Bouncer,’ scans all apps, Computerworld.,”
obtain of detection performances. Computerworld, 2012. .
9. S. Y. Yerima, S. Sezer, and I. Muttik, “High accuracy
There are several enhancements that can be carried out for android malware detection using ensemble learning,” IE
future improvement of water level prediction by using Inf. Secur., vol. 9, no. 6, pp. 313–320, 2015.
machine learning such as False Alarms referred to the 10. GDATA, “Cyber attacks on Android devices on the rise,”
statistical measurement of how well the sample dataset GDATA, 2018. .
classifies the Android malware correctly. This means that the 11. M. F. A. Razak, N. B. Anuar, F. Othman, A. Firdaus, F.
malware data was incorrectly predicted as benign. This Afifi, and R. Salleh, “Bio-inspired for Features
Optimization and Malware Detection,” Arab. J. Sci. Eng.,
problem is lead to incorrect detection of malware and even
vol. 43, no. 12, pp. 6963–6979, 2018.
small amounts of false alarms can cause huge impact. A
12. Symantec, “Internet Security Threat Report,” 2018.
reliable and efficient detection module is needed in order to
13. Statista, “Global market share held by the leading
solve this problem. Besides, the more complex and extensive smartphone operating systems in sales to end users from
data, the harder it becomes to choose the relevant features to 1st quarter 2009 to 2nd quarter 2018,” Statista, 2019.
improve detection performances.

332
Nuren Natasha Maulat Nasri et al., International Journal of Advanced Trends in Computer Science and Engineering, 9(1.5), 2020, 327 – 333

.https://www.statista.com/statistics/266136/global-marke
t-share-held-by-smartphone-operating-systems/
14. D. Palmer, “FalseGuide malware dupes 600,000 Android
users into joining botnet,” ZDNet, 2017.
15. S. Y. Yerima, S. Sezer, and G. McWilliams, “Analysis of
Bayesian classification-based approaches for Android
malware detection,” IET Inf. Secur., vol. 8, no. 1, pp.
25–36, 2014.
16. Z. Mas’Ud, S. Sahib, M. F. Abdollah, S. R. Selamat, and
R. Yusof, “Analysis of features selection and machine
learning classifier in android malware detection,” ICISA
2014 - 2014 5th Int. Conf. Inf. Sci. Appl., pp. 1–5, 2014.
17. D. A. Alotaibi, M. F. Aldakheel, N. S. Al-serhani, R.
Zagrouba, I. Technology, and S. Arabia, “MACHINE
LEARNING BASED ON MALWARE DETECTION IN
MOBILE,” vol. 31, no. 3, pp. 505–511, 2019.
18. M. Kedziora, P. Gawin, and M. Szczepanik, “Android
Malware Detection Using Machine Learning And
Reverse Engineering,” no. 616, pp. 95–107, 2018.
19. Y. Mirsky, A. Shabtai, L. Rokach, B. Shapira, and Y.
Elovici, “SherLock vs moriarty: A smartphone dataset for
cybersecurity research,” AISec 2016 - Proc. 2016 ACM
Work. Artif. Intell. Secur. co-located with CCS 2016, pp.
1–12, 2016,
20. T. S. Chou, J. Pickard, and C. Popoviciu, “Machine
learning based IP network traffic classification using
feature significance analysis,” WMSCI 2018 - 22nd
World Multi-Conference Syst. Cyber Informatics, Proc.,
vol. 1, no. 3, pp. 1–3, 2018.
21. E. S. Team, “What is Machine Learning? A definition,”
Expert System, 2017
22. N. S. Zaini et al., “Phishing detection system using
machine learning classifiers,” Indones. J. Electr. Eng.
Comput. Sci., vol. 17, no. 3, pp. 1165–1171, 2019,
23. M. F. A. Razak, N. B. Anuar, R. Salleh, A. Firdaus, M.
Faiz, and H. S. Alamri, “‘Less Give More’: Evaluate and
zoning Android applications,” Meas. J. Int. Meas.
Confed., vol. 133, pp. 396–411, 2019.
24. M. H. Kamarudin, C. Maple, T. Watson, and N. S. Safa,
“A LogitBoost-based Algorithm for Detecting Known
and Unknown Web Attacks,” IEEE Access, vol. 3536,
pp. 1–12, 2017.
25. O. V. Lee et al., “A malicious URLs detection system
using optimization and machine learning classifiers,”
Indones. J. Electr. Eng. Comput. Sci., vol. 17, no. 3, pp.
1210–1214, 2020.
26. N. S. Zaini, D. Stiawan, A. F. Mohd Faizal Ab Razak, S.
K. Wan Isni Sofiah Wan Din, and T. Sutikno, “Phishing
detection system using machine learning classifiers,”
Indones. J. Electr. Eng. Comput. Sci., vol. 17, no. 3, pp.
1165–1171, 2020.

333

You might also like