Home > Research > Publications & Outputs > cHybriDroid

Links

Text available via DOI:

View graph of relations

cHybriDroid: A machine learning based hybrid technique for securing the mobile edge

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

cHybriDroid: A machine learning based hybrid technique for securing the mobile edge. / Maryam, Afifa; Ahmed, Usman; Aleem, Muhammad et al.
In: Security and Communication Networks, Vol. 2020, 8861639 , 27.11.2020.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Maryam, A, Ahmed, U, Aleem, M, Lin, JC-W, Islam, MA & Iqbal, MA 2020, 'cHybriDroid: A machine learning based hybrid technique for securing the mobile edge', Security and Communication Networks, vol. 2020, 8861639 . https://doi.org/10.1155/2020/8861639

APA

Maryam, A., Ahmed, U., Aleem, M., Lin, J. C.-W., Islam, M. A., & Iqbal, M. A. (2020). cHybriDroid: A machine learning based hybrid technique for securing the mobile edge. Security and Communication Networks, 2020, Article 8861639 . https://doi.org/10.1155/2020/8861639

Vancouver

Maryam A, Ahmed U, Aleem M, Lin JCW, Islam MA, Iqbal MA. cHybriDroid: A machine learning based hybrid technique for securing the mobile edge. Security and Communication Networks. 2020 Nov 27;2020:8861639 . doi: 10.1155/2020/8861639

Author

Maryam, Afifa ; Ahmed, Usman ; Aleem, Muhammad et al. / cHybriDroid : A machine learning based hybrid technique for securing the mobile edge. In: Security and Communication Networks. 2020 ; Vol. 2020.

Bibtex

@article{4ab790da539d433e8fd9bee1f3da9160,
title = "cHybriDroid: A machine learning based hybrid technique for securing the mobile edge",
abstract = "Smart phones are an integral component of the mobile edge computing (MEC) framework. Securing the data stored on mobile devices is very crucial for ensuring the smooth operations of cloud services. A growing number of malicious Android applications demand an in-depth investigation to dissect their malicious intent to design effective malware detection techniques. The contemporary state-of-the-art model suggests that hybrid features based on machine learning (ML) techniques could play a significant role in android malware detection. The selection of application{\textquoteright}s features plays a very crucial role to capture the appropriate behavioural patterns of malware instances for a useful classification of mobile applications. In this study, we propose a novel hybrid approach to detect android malware, wherein static features in conjunction with dynamic features of smart phone applications are employed. We collect these hybrid features using permissions, intents, and run-time features (such as information leakage, cryptography{\textquoteright}s exploitation, and network manipulations) to analyse the effectiveness of the employed techniques for malware detection. We conduct experiments using over 5,000 real-world applications. The outcomes of the study reveal that the proposed set of features has successfully detected malware threats with 97% F-measure results.",
author = "Afifa Maryam and Usman Ahmed and Muhammad Aleem and Lin, {Jerry Chun-Wei} and Islam, {Muhammad Arshad} and Iqbal, {Muhammad Azhar}",
year = "2020",
month = nov,
day = "27",
doi = "10.1155/2020/8861639",
language = "English",
volume = "2020",
journal = "Security and Communication Networks",
issn = "1939-0114",
publisher = "John Wiley and Sons Inc.",

}

RIS

TY - JOUR

T1 - cHybriDroid

T2 - A machine learning based hybrid technique for securing the mobile edge

AU - Maryam, Afifa

AU - Ahmed, Usman

AU - Aleem, Muhammad

AU - Lin, Jerry Chun-Wei

AU - Islam, Muhammad Arshad

AU - Iqbal, Muhammad Azhar

PY - 2020/11/27

Y1 - 2020/11/27

N2 - Smart phones are an integral component of the mobile edge computing (MEC) framework. Securing the data stored on mobile devices is very crucial for ensuring the smooth operations of cloud services. A growing number of malicious Android applications demand an in-depth investigation to dissect their malicious intent to design effective malware detection techniques. The contemporary state-of-the-art model suggests that hybrid features based on machine learning (ML) techniques could play a significant role in android malware detection. The selection of application’s features plays a very crucial role to capture the appropriate behavioural patterns of malware instances for a useful classification of mobile applications. In this study, we propose a novel hybrid approach to detect android malware, wherein static features in conjunction with dynamic features of smart phone applications are employed. We collect these hybrid features using permissions, intents, and run-time features (such as information leakage, cryptography’s exploitation, and network manipulations) to analyse the effectiveness of the employed techniques for malware detection. We conduct experiments using over 5,000 real-world applications. The outcomes of the study reveal that the proposed set of features has successfully detected malware threats with 97% F-measure results.

AB - Smart phones are an integral component of the mobile edge computing (MEC) framework. Securing the data stored on mobile devices is very crucial for ensuring the smooth operations of cloud services. A growing number of malicious Android applications demand an in-depth investigation to dissect their malicious intent to design effective malware detection techniques. The contemporary state-of-the-art model suggests that hybrid features based on machine learning (ML) techniques could play a significant role in android malware detection. The selection of application’s features plays a very crucial role to capture the appropriate behavioural patterns of malware instances for a useful classification of mobile applications. In this study, we propose a novel hybrid approach to detect android malware, wherein static features in conjunction with dynamic features of smart phone applications are employed. We collect these hybrid features using permissions, intents, and run-time features (such as information leakage, cryptography’s exploitation, and network manipulations) to analyse the effectiveness of the employed techniques for malware detection. We conduct experiments using over 5,000 real-world applications. The outcomes of the study reveal that the proposed set of features has successfully detected malware threats with 97% F-measure results.

U2 - 10.1155/2020/8861639

DO - 10.1155/2020/8861639

M3 - Journal article

VL - 2020

JO - Security and Communication Networks

JF - Security and Communication Networks

SN - 1939-0114

M1 - 8861639

ER -