TY - JOUR
T1 - An improved pre-exploitation detection model for Android malware attacks
AU - Al Besher, Hamad Saleh A.
AU - Bin Rohani, Mohd Fo ad
AU - Al-Rimy, Bander Ali Saleh
N1 - Publisher Copyright:
© by the authors.
PY - 2024/10/1
Y1 - 2024/10/1
N2 - This paper presents an innovative approach to the early detection of Android malware, focusing on a dynamic pre-exploitation phase identification system. Traditional methods often rely on static thresholding to delineate the pre-exploitation phase of malware attacks, which can be insufficient due to the diverse behaviors exhibited by various malware families. This study introduces the Dynamic Pre-exploitation Boundary Definition and Feature Extraction (DPED-FE) system to address these limitations, which utilizes entropy for change detection, thus enabling more accurate and timely identification of potential threats before they reach the exploitation phase. A comprehensive analysis of the system's methodology is provided, including the use of vector space models with Kullback-Leibler divergence for dynamic boundary detection and advanced feature extraction techniques such as Weighted Term Frequency-Inverse Document Frequency (WF-IDF) to enhance its predictive capabilities. The experimental results demonstrate the superior performance of DPED-FE compared to traditional methods, highlighting its effectiveness in real-world scenarios.
AB - This paper presents an innovative approach to the early detection of Android malware, focusing on a dynamic pre-exploitation phase identification system. Traditional methods often rely on static thresholding to delineate the pre-exploitation phase of malware attacks, which can be insufficient due to the diverse behaviors exhibited by various malware families. This study introduces the Dynamic Pre-exploitation Boundary Definition and Feature Extraction (DPED-FE) system to address these limitations, which utilizes entropy for change detection, thus enabling more accurate and timely identification of potential threats before they reach the exploitation phase. A comprehensive analysis of the system's methodology is provided, including the use of vector space models with Kullback-Leibler divergence for dynamic boundary detection and advanced feature extraction techniques such as Weighted Term Frequency-Inverse Document Frequency (WF-IDF) to enhance its predictive capabilities. The experimental results demonstrate the superior performance of DPED-FE compared to traditional methods, highlighting its effectiveness in real-world scenarios.
KW - android
KW - machine learning, TF-IDF
KW - malware
KW - pre-exploitation
UR - http://www.scopus.com/inward/record.url?scp=85207498396&partnerID=8YFLogxK
U2 - 10.48084/etasr.7661
DO - 10.48084/etasr.7661
M3 - Article
AN - SCOPUS:85207498396
SN - 2241-4487
VL - 14
SP - 16252
EP - 16259
JO - Engineering, Technology and Applied Science Research
JF - Engineering, Technology and Applied Science Research
IS - 5
ER -