Babbar, Himanshi ORCID: https://orcid.org/0000-0003-4580-6617, Rani, Shalli ORCID: https://orcid.org/0000-0002-8474-9435, Sah, Dipak Kumar, AlQahtani, Salman A ORCID: https://orcid.org/0000-0003-1233-1774 and Bashir, Ali Kashif ORCID: https://orcid.org/0000-0003-2601-9327 (2023) Detection of Android Malware in the Internet of Things through the K-Nearest Neighbor Algorithm. Sensors, 23 (16). 7256. ISSN 1424-8220
|
Published Version
Available under License Creative Commons Attribution. Download (4MB) | Preview |
Abstract
Predicting attacks in Android malware devices using machine learning for recommender systems-based IoT can be a challenging task. However, it is possible to use various machine-learning techniques to achieve this goal. An internet-based framework is used to predict and recommend Android malware on IoT devices. As the prevalence of Android devices grows, the malware creates new viruses on a regular basis, posing a threat to the central system’s security and the privacy of the users. The suggested system uses static analysis to predict the malware in Android apps used by consumer devices. The training of the presented system is used to predict and recommend malicious devices to block them from transmitting the data to the cloud server. By taking into account various machine-learning methods, feature selection is performed and the K-Nearest Neighbor (KNN) machine-learning model is proposed. Testing was carried out on more than 10,000 Android applications to check malicious nodes and recommend that the cloud server block them. The developed model contemplated all four machine-learning algorithms in parallel, i.e., naive Bayes, decision tree, support vector machine, and the K-Nearest Neighbor approach and static analysis as a feature subset selection algorithm, and it achieved the highest prediction rate of 93% to predict the malware in real-world applications of consumer devices to minimize the utilization of energy. The experimental results show that KNN achieves 93%, 95%, 90%, and 92% accuracy, precision, recall and f1 measures, respectively.
Impact and Reach
Statistics
Additional statistics for this dataset are available via IRStats2.