ENSIC: Feature Selection on Android Malware Detection Attributes Using an Enhanced Non-Linear SVM Integrated with Cross Validator
Keywords:
Correlation, Embedded Approach, Feature Selection, Intents, Recursive Feature EliminationAbstract
The digital telecom world made the humans to have android based mobiles. Hackers are realising more number of threatening applications daily to attack the android devices either to steal the personal information or to commit fraud money transaction. These cyber crimes, which attacks the devices functionality or security is known as “Malware Attacks”. The proposed research aims to identify the impact of the android device factors like call signals, intents, and commands to access an application in classifying the malware attacks. Existing dataset contains 215 sub attributes for the given factors, which is treated as a high dimensionality according the principles of the machine learning. So, the previous researchers implemented traditional feature selection techniques like correlation, which consumes high computational time because bi-variate or multi variate with chi-square analysis needs to do lot of computations in between the different pairs of attributes. Using the recursive feature elimination has produced more number of attributes, which is more than half of the attributes and has got average accuracy with high mis-classification rate. The proposed research enhances the embedded approach by integrating the non-linear customized SVM (Support Vector Machine) with cross validated pipelining feature. This increases the accuracy of the model and reduces the number of essential attributes to 74 with 95.58% accuracy.
Downloads
References
The digital telecom world made the humans to have android based mobiles. Hackers are realising more number of threatening applications daily to attack the android devices either to steal the personal information or to commit fraud money transaction. These cyber crimes, which attacks the devices functionality or security is known as “Malware Attacks”. The proposed research aims to identify the impact of the android device factors like call signals, intents, and commands to access an application in classifying the malware attacks. Existing dataset contains 215 sub attributes for the given factors, which is treated as a high dimensionality according the principles of the machine learning. So, the previous researchers implemented traditional feature selection techniques like correlation, which consumes high computational time because bi-variate or multi variate with chi-square analysis needs to do lot of computations in between the different pairs of attributes. Using the recursive feature elimination has produced more number of attributes, which is more than half of the attributes and has got average accuracy with high mis-classification rate. The proposed research enhances the embedded approach by integrating the non-linear customized SVM (Support Vector Machine) with cross validated pipelining feature. This increases the accuracy of the model and reduces the number of essential attributes to 74 with 95.58% accuracy.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.