Show simple item record

dc.contributor.authorMaryam, Afifa
dc.contributor.authorAhmed, Usman
dc.contributor.authorAleem, Muhammad
dc.contributor.authorLin, Jerry Chun-Wei
dc.contributor.authorMuhammad Arshad, Islam
dc.contributor.authorIqbal, Muhammad Azhar
dc.identifier.citationMaryam, A., Ahmed, U., Aleem, M., Lin, J. C.-W., Arshad Islam, M., Iqbal, M. A., & Srivastava, G. (2020). cHybriDroid: A Machine Learning-Based Hybrid Technique for Securing the Edge Computing. Security and Communication Networks, 2020, 8861639.en_US
dc.description.abstractSmart phones are an integral component of the mobile edge computing (MEC) framework. Securing the data stored on mobile devices is very crucial for ensuring the smooth operations of cloud services. A growing number of malicious Android applications demand an in-depth investigation to dissect their malicious intent to design effective malware detection techniques. The contemporary state-of-the-art model suggests that hybrid features based on machine learning (ML) techniques could play a significant role in android malware detection. The selection of application’s features plays a very crucial role to capture the appropriate behavioural patterns of malware instances for a useful classification of mobile applications. In this study, we propose a novel hybrid approach to detect android malware, wherein static features in conjunction with dynamic features of smart phone applications are employed. We collect these hybrid features using permissions, intents, and run-time features (such as information leakage, cryptography’s exploitation, and network manipulations) to analyse the effectiveness of the employed techniques for malware detection. We conduct experiments using over 5,000 real-world applications. The outcomes of the study reveal that the proposed set of features has successfully detected malware threats with 97% F-measure results.en_US
dc.rightsNavngivelse 4.0 Internasjonal*
dc.titlecHybriDroid: A Machine Learning-Based Hybrid Technique for Securing the Edge Computingen_US
dc.typeJournal articleen_US
dc.typePeer revieweden_US
dc.rights.holderCopyright © 2020 Afifa Maryam et al.en_US
dc.subject.nsiVDP::Technology: 500::Information and communication technology: 550en_US
dc.source.journalSecurity and Communication Networksen_US

Files in this item


This item appears in the following Collection(s)

Show simple item record

Navngivelse 4.0 Internasjonal
Except where otherwise noted, this item's license is described as Navngivelse 4.0 Internasjonal