Design an Adaptive Hybrid Approach for Genetic Algorithm to Detect Effective Malware Detection in Android Division
PDF
PDF

How to Cite

Vivekanandam, B. 2021. “Design an Adaptive Hybrid Approach for Genetic Algorithm to Detect Effective Malware Detection in Android Division”. Journal of Ubiquitous Computing and Communication Technologies 3 (2): 135-49. https://doi.org/10.36548/jucct.2021.2.006.

Keywords

— Genetic algorithm
— android malware detection process
Published: 23-07-2021

Abstract

Data pre-processing is critical for handling classification issues in the field of machine learning and model identification. The processing of big data sets increases the computer processing time and space complexity while decreasing classification model precision. As a result, it is necessary to develop an appropriate method for selecting attributes. This article describes a machine learning technique to solve functional selection by safeguarding the selection and mutation operators of genetic algorithms. During population calculations in the training set, the proposed method is adaptable. Furthermore, for various population sizes, the proposed method gives the best possible probability of resolving function selection difficulties during training process. Furthermore, the proposed work is combined with a better classifier in order to detect the different malware categories. The proposed approach is compared and validated with current techniques by using different datasets. In addition to the test results, this research work utilizes the algorithm for solving a real challenge in Android categorization, and the results show that, the proposed approach is superior. Besides, the proposed algorithm provides a better mean and standard deviation value in the optimization process for leveraging model effectiveness at different datasets.

References

  1. Ranganathan, G. "Real time anomaly detection techniques using pyspark frame work." Journal of Artificial Intelligence 2, no. 01 (2020): 20-30.
  2. Jose, Rinu Rani, and A. Salim. "Integrated static analysis for malware variants detection." In International Conference on Inventive Computation Technologies, pp. 622-629. Springer, Cham, 2019.
  3. Sivaganesan, D. "A Data Driven Trust Mechanism Based on Blockchain in IoT Sensor Networks for Detection and Mitigation of Attacks." Journal of trends in Computer Science and Smart technology (TCSST) 3, no. 01 (2021): 59-69.
  4. Kumar, Ashwin A., G. P. Anoosh, M. S. Abhishek, and C. Shraddha. "An Effective Machine Learning-Based File Malware Detection—A Survey." In International Conference on Communication, Computing and Electronics Systems, pp. 355-360. Springer, Singapore, 2020.
  5. Adam, Edriss Eisa Babikir. "Evaluation of Fingerprint Liveness Detection by Machine Learning Approach-A Systematic View." Journal of ISMAC 3, no. 01 (2021): 16-30.
  6. Suma, V. "Community Based Network Reconstruction for an Evolutionary Algorithm Framework." Journal of Artificial Intelligence 3, no. 01 (2021): 53-61.
  7. Soni, Jayesh, Suresh K. Peddoju, Nagarajan Prabakar, and Himanshu Upadhyay. "Comparative Analysis of LSTM, One-Class SVM, and PCA to Monitor Real-Time Malware Threats Using System Call Sequences and Virtual Machine Introspection." In International Conference on Communication, Computing and Electronics Systems: Proceedings of ICCCES 2020, vol. 733, p. 113. Springer Nature, 2021.
  8. Hamdan, Yasir Babiker. "Faultless Decision Making for False Information in Online: A Systematic Approach." Journal of Soft Computing Paradigm (JSCP) 2, no. 04 (2020): 226-235
  9. Agrawal, Prerna, and Bhushan Trivedi. "AndroHealthCheck: A Malware Detection System for Android Using Machine Learning." In Computer Networks, Big Data and IoT, pp. 35-41. Springer, Singapore, 2021.
  10. Chen, Joy Iong Zong, and Lu-Tsou Yeh. "Graphene based Web Framework for Energy Efficient IoT Applications." Journal of Information Technology 3, no. 01 (2021): 18-28.
  11. Smys, S., and Haoxiang Wang. "Security Enhancement in Smart Vehicle Using Blockchain-based Architectural Framework." Journal of Artificial Intelligence 3, no. 02 (2021): 90-100.
  12. Raj, Jennifer S. "Security Enhanced Blockchain based Unmanned Aerial Vehicle Health Monitoring System." Journal of ISMAC 3, no. 02 (2021): 121-131.
  13. Yang Huan, Zhang Yuqing, Hu Yupu, etc. Android application malicious behavior detection system based on multiple characteristics; Chinese Journal of Computers, 2014, 37(1):15-27.
  14. Amos B, Turner H, White J. Applying machine learning classifiers to dynamic Android malware detection at scale. 2013.
  15. Zhang B T. Hypernetworks: A Molecular Evolutionary Architecture for Cognitive Learning and Memory. IEEE Computational Intelligence Magazine, 2008, 3(3):49-63.
  16. Yerima, Suleiman Y., Sakir Sezer, and Gavin McWilliams. "Analysis of Bayesian classification-based approaches for Android malware detection." IET Information Security 8, no. 1 (2014): 25-36.
  17. Shabtai, Asaf, Yuval Fledel, and Yuval Elovici. "Automated static code analysis for classifying android applications using machine learning." In 2010 international conference on computational intelligence and security, pp. 329-333. IEEE, 2010.
  18. Suma, V., and Wang Haoxiang. "Optimal Key Handover Management for Enhancing Security in Mobile Network." Journal of trends in Computer Science and Smart technology (TCSST) 2, no. 04 (2020): 181-187.
  19. Sanz, Borja, Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Pablo Garcia Bringas, and Gonzalo Álvarez. "Puma: Permission usage to detect malware in android." In International Joint Conference CISIS’12-ICEUTE 12-SOCO 12 Special Sessions, pp. 289-298. Springer, Berlin, Heidelberg, 2013.
  20. Peiravian, Naser, and Xingquan Zhu. "Machine learning for android malware detection using permission and api calls." In 2013 IEEE 25th international conference on tools with artificial intelligence, pp. 300-305. IEEE, 2013.
  21. Yildiz, Oktay, and Ibrahim Alper Doğru. "Permission-based android malware detection system using feature selection with genetic algorithm." International Journal of Software Engineering and Knowledge Engineering 29, no. 02 (2019): 245-262.
  22. Jung, Jaemin, Kyeonghwan Lim, Byoungchul Kim, Seong-je Cho, Sangchul Han, and Kyoungwon Suh. "Detecting malicious android apps using the popularity and relations of apis." In 2019 IEEE Second International Conference on Artificial Intelligence and Knowledge Engineering (AIKE), pp. 309-312. IEEE, 2019.
  23. Simoes, A.; Costa, E. Using genetic algorithms with sexual or asexual transposition: a comparative study. Proc. CEC00 2000, 10, 1196–1203.
  24. Farasat, A.; Menhaj, M.B.; Mansouri, T.; Moghadam, M.R. ARO: A new model-free optimization algorithm inspired from asexual reproduction. Appl. Soft Comput. 2010, 10, 1284–1292.
  25. Sharma, Kapil, Anish Singh, and Prateek Arora. "A Study of Android Malware Detection Using Static Analysis." In Computer Networks and Inventive Communication Technologies, pp. 1071-1080. Springer, Singapore, 2021.
  26. Komatwar, Rupali, and Manesh Kokare. "Malware Identification and Classification by Imagining Executable." In Proceedings of International Conference on Intelligent Computing, Information and Control Systems, pp. 375-387. Springer, Singapore, 2021.
  27. Shakya, Subarna. "IoT based F-RAN Architecture using Cloud and Edge Detection System." Journal of ISMAC 3, no. 01 (2021): 31-39.