Transparent Peer Review By Scholar9
ANDROID MALWARE DETECTION MODEL USING LOGISTIC REGRESSION
Abstract
The proliferation of Android malicious applications dangerously injure users information, property, and privacy. Aiming at the problem that the characteristics of malware dynamic analysis and detection aren’t excellent, and the detection efficiency and classifier performance are insufficient, this paper proposes a multi-dimensional feature fusion malicious application detection method based on Logistic Regression .The method provided non-invasively extract the framework layer Application Programming Interface(API) call information of the Android application, apply the Logistic Regression to train the N-gram modelled API call sequence, fuse the obtained probability feature with the basic statistical feature, The experimental results show that the method effectively improves the accuracy of Android malicious application detection and decreases the time expense of it.
Phanindra Kumar Kankanampati Reviewer
10 Oct 2024 05:48 PM
Approved
Relevance and Originality
The research article addresses a significant concern in cybersecurity, specifically focusing on the detection of malicious Android applications. With the increasing prevalence of malware targeting mobile devices, the relevance of this study is substantial, as it aims to protect users’ information, property, and privacy. The originality of the work is evident in the proposed multi-dimensional feature fusion method based on Logistic Regression, which enhances the detection capabilities compared to existing approaches. This novel perspective on dynamic analysis and detection methods adds value to the field of mobile security research.
Methodology
The methodology employed in the research is commendable, utilizing a multi-dimensional feature fusion approach to detect Android malicious applications. The non-invasive extraction of API call information is particularly noteworthy, as it minimizes the risk of impacting the application's performance. However, the article would benefit from a more detailed explanation of the experimental setup, including the datasets used, the criteria for selecting features, and the specific N-gram modeling technique applied. Providing information on the training and testing phases, as well as the evaluation metrics utilized, would enhance the overall clarity of the methodology.
Validity & Reliability
The validity and reliability of the findings are crucial for establishing the effectiveness of the proposed detection method. The experimental results indicate an improvement in accuracy and reduced detection time, which is promising. However, to strengthen the validity, it would be beneficial to include a comparative analysis with other existing detection methods to highlight the advantages of the proposed approach. Additionally, discussing potential limitations in the study, such as the generalizability of the findings across different types of malicious applications or the influence of varying environments, would provide a clearer understanding of the results' reliability.
Clarity and Structure
The clarity and structure of the research article are generally effective, allowing readers to follow the main points of the study. However, organizing the content into well-defined sections, such as Introduction, Methodology, Results, and Discussion, would enhance readability. Including a brief overview of existing literature related to Android malware detection would provide context for the research. Furthermore, defining technical terms and concepts related to dynamic analysis and Logistic Regression would make the article more accessible to a broader audience.
Result Analysis
The result analysis in the research article shows promising outcomes regarding the proposed detection method's effectiveness. While the findings indicate improved accuracy in detecting malicious applications, the article could benefit from incorporating visual aids, such as graphs or tables, to illustrate the results more clearly. A more detailed discussion of the practical implications of these results for users and developers, as well as recommendations for implementing the detection method in real-world scenarios, would enhance the significance of the findings. Additionally, exploring potential future work, such as refining the feature extraction process or incorporating additional machine learning techniques, would provide valuable directions for ongoing research in this area.
IJ Publication Publisher
Ok Sir
Phanindra Kumar Kankanampati Reviewer