Please use this identifier to cite or link to this item: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/1743
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAdebayo, Olawale Surajudeen-
dc.contributor.authorAbdul Aziz, Normaziah-
dc.date.accessioned2021-06-06T13:45:28Z-
dc.date.available2021-06-06T13:45:28Z-
dc.date.issued2015-03-
dc.identifier.issn1554-1010-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/1743-
dc.description.abstractSeveral machine learning techniques based on supervised learning have been applied to classify malware. However, supervised learning technique has limitations for malware classification task. This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. The algorithm is improved with Particle Swarm Optimization that trains three different supervised classifiers. In this method, permission-based features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. Using a number of candidate detectors from an improved Apriori Algorithm with Particle Swarm Optimization, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. The results of the experiments show that the proposed combined technique has better results as compared to using only supervised or unsupervised learners.en_US
dc.description.sponsorshipFederal University of Technology Minna / International Islamic University Malaysiaen_US
dc.language.isoenen_US
dc.publisherJournal of Information Assurance and Securityen_US
dc.relation.ispartofseriesVolume 10;4-
dc.subjectParticle Swarm Optimizationen_US
dc.subjectMalware Detectionen_US
dc.subjectApriori Algorithmen_US
dc.subjectMalicious Applicationen_US
dc.titleStatic Code Analysis of Permission-based Features for Android Malware Classification Using Apriori Algorithm with Particle Swarm Optimizationen_US
dc.typeArticleen_US
Appears in Collections:Cyber Security Science

Files in This Item:
File Description SizeFormat 
jias published paperMIT.pdf891.78 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.