Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.
dc.contributor.author | Saima Akbar, 01-241212-008 | |
dc.date.accessioned | 2024-06-03T08:24:07Z | |
dc.date.available | 2024-06-03T08:24:07Z | |
dc.date.issued | 2023 | |
dc.identifier.uri | http://hdl.handle.net/123456789/17404 | |
dc.description | Supervised by Dr. Tamim Ahmed Khan | en_US |
dc.description.abstract | The increasing use of android mobile devices and the complexity of applications have led to increase in malware threats, Information, and demanding robust security measures for safeguarding user privacy. We investigate the use of deep learning techniques in detection of Android Malware considering the latest data sets. We aim to improve the system’s ability to accurately classify and detect a wider range of Android malware variants. We provide APK analysis for a feature extraction mechanism capable of extracting a total of 43,377 features from a dataset comprising 1201 each malware classes in total 13,211 malware and 1201 Benign applications. After meticulous selection, we retain only 10,524 features,which are subsequently used to train the neural networks. This dataset enables thorough evaluation and validation of the proposed detection system. We make use of APK .extracted from ANDROZOO for the purpose of dataset generation. Performance metrics which is used in this research are detection accuracy, recall, F1 score and precision are utilized to deter me the efficacy of the enhanced detection approach. This research explores the effectiveness of convolution neural network (CNN)and deep neural network (DNN) models for Android malware detection using static features. By utilizing our own dataset, we evaluate the performance of both models and compare their accuracy rates. Our results demonstrate that the DNN model accuracy rate of 97%, which is outperforming the CNN model, which achieves a slightly lower accuracy rate of 96%. Transfer Learning(TL) based model also achieves a slightly lower accuracy rate of.94%but has the advantage to classify unseen or zero-day attacks. These findings highlight the potential of DNN-based approaches in enhancing the detection and prevention of Android malware, showcasing their superiority over the CNN as well TL based classifiers. The evaluation also highlights the importance of considering an expanded number of malware classes, as it significantly enhances the system’s capability to detect diverse malware families both known . | en_US |
dc.language.iso | en | en_US |
dc.publisher | Software Engineering, Bahria University Engineering School Islamabad | en_US |
dc.relation.ispartofseries | MS-SE;T-2698 | |
dc.subject | Software Engineering | en_US |
dc.subject | Data Synthesis | en_US |
dc.subject | Algorithmic Details | en_US |
dc.title | Android Malware Detection Using Static Features Of Mobile Applications | en_US |
dc.type | Thesis | en_US |