z-logo
open-access-imgOpen Access
Android malware classification based on random vector functional link and artificial Jellyfish Search optimizer
Author(s) -
Emad T. Elkabbash,
Reham R. Mostafa,
Sherif Barakat
Publication year - 2021
Publication title -
plos one
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.99
H-Index - 332
ISSN - 1932-6203
DOI - 10.1371/journal.pone.0260232
Subject(s) - computer science , android (operating system) , malware , exploit , support vector machine , machine learning , artificial intelligence , random forest , computer security , operating system
Smartphone usage is nearly ubiquitous worldwide, and Android provides the leading open-source operating system, retaining the most significant market share and active user population of all open-source operating systems. Hence, malicious actors target the Android operating system to capitalize on this consumer reliance and vulnerabilities present in the system. Hackers often use confidential user data to exploit users for advertising, extortion, and theft. Notably, most Android malware detection tools depend on conventional machine-learning algorithms; hence, they lose the benefits of metaheuristic optimization. Here, we introduce a novel detection system based on optimizing the random vector functional link (RVFL) using the artificial Jellyfish Search (JS) optimizer following dimensional reduction of Android application features. JS is used to determine the optimal configurations of RVFL to improve classification performance. RVFL+JS minimizes the runtime of the execution of the optimized models with the best performance metrics, based on a dataset consisting of 11,598 multi-class applications and 471 static and dynamic features.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here