Please use this identifier to cite or link to this item: http://dspace.dtu.ac.in:8080/jspui/handle/repository/18963
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSHUKLA, ABHISHEK-
dc.date.accessioned2022-02-21T08:52:07Z-
dc.date.available2022-02-21T08:52:07Z-
dc.date.issued2020-10-
dc.identifier.urihttp://dspace.dtu.ac.in:8080/jspui/handle/repository/18963-
dc.description.abstractThe Android platform became one of the most vulnerable targets for cyberattacks in recent times due to a rapid surge in malware embedded apps. Researchers have inves- tigated various machine learning techniques for Android malware detection but most of these techniques are inefficient against the novel malware. The various problems like code obfuscation, the requirement of device root privileges, simulated and small size datasets pose serious flaws to the existing solutions. This work evaluates several machine learning models for mitigating these issues using low-privileged monitorable features sampled in the SherLock dataset. The findings of this research conclude that the XGBoost clas- sifier is the most accurate in detecting the malware compared to other classifiers with 93% overall values of precision, recall, and accuracy. In terms of FNR values, which sig- nify the undetected malware, the XGBoost classifier also performs better than the other algorithms with values of 7.0%en_US
dc.language.isoenen_US
dc.relation.ispartofseriesTD-5547;-
dc.subjectANDROID MALWARE DETECTIONen_US
dc.subjectMACHINE LEARNING TECHNIQUEen_US
dc.subjectMONITORABLE FEATURESen_US
dc.titleANDROID MALWARE DETECTION USING MACHINE LEARNING TECHNIQUE ON LOW-PRIVILEGED MONITORABLE FEATURESen_US
dc.typeThesisen_US
Appears in Collections:M.E./M.Tech. Computer Engineering

Files in This Item:
File Description SizeFormat 
Abhishek Shukla M.Tech..pdf837.68 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.