An improved pre-exploitation detection model for Android malware attacks

Hamad Saleh A. Al Besher*, Mohd Fo ad Bin Rohani, Bander Ali Saleh Al-Rimy

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

13 Downloads (Pure)

Abstract

This paper presents an innovative approach to the early detection of Android malware, focusing on a dynamic pre-exploitation phase identification system. Traditional methods often rely on static thresholding to delineate the pre-exploitation phase of malware attacks, which can be insufficient due to the diverse behaviors exhibited by various malware families. This study introduces the Dynamic Pre-exploitation Boundary Definition and Feature Extraction (DPED-FE) system to address these limitations, which utilizes entropy for change detection, thus enabling more accurate and timely identification of potential threats before they reach the exploitation phase. A comprehensive analysis of the system's methodology is provided, including the use of vector space models with Kullback-Leibler divergence for dynamic boundary detection and advanced feature extraction techniques such as Weighted Term Frequency-Inverse Document Frequency (WF-IDF) to enhance its predictive capabilities. The experimental results demonstrate the superior performance of DPED-FE compared to traditional methods, highlighting its effectiveness in real-world scenarios.

Original languageEnglish
Pages (from-to)16252-16259
Number of pages8
JournalEngineering, Technology and Applied Science Research
Volume14
Issue number5
Early online date11 Aug 2024
DOIs
Publication statusPublished - 1 Oct 2024

Keywords

  • android
  • machine learning, TF-IDF
  • malware
  • pre-exploitation

Fingerprint

Dive into the research topics of 'An improved pre-exploitation detection model for Android malware attacks'. Together they form a unique fingerprint.

Cite this