DOAJ Open Access 2019

Data on Vulnerability Detection in Android

Shivi Garg Niyati Baliyan

Abstrak

The data in this article have been collaborated from mainly four sources- Google Playstore,11 Google Playstore https://play.google.com/store/apps. Wandoujia22 Wandoujia apps http://www.wandoujia.com/apps. (third party app store market), AMD33 AMD http://amd.arguslab.org/sharing. and Androzoo.44 Androzoo https://androzoo.uni.lu/access. These data include ~85,000 APKs (Android Package Kit), both malicious and benign from these data sources. Static and dynamic features are extracted from these APK files, and then supervised machines learning algorithms are employed for malware detection in Android. This data article also provides the Python code for data analysis. For feature extraction, a generic algorithm has also been incorporated, thereby, selecting important and relevant feature subset. Conclusive results obtained from this data set are further comprehended and interpreted in our latest research study “A Novel Parallel Classifier Scheme for Vulnerability Detection in Android” (Garg et al., 2018). This proved to be precious contribution for ensembling classifiers in machine learning to detect malware in Android.

Penulis (2)

S

Shivi Garg

N

Niyati Baliyan

Format Sitasi

Garg, S., Baliyan, N. (2019). Data on Vulnerability Detection in Android. https://doi.org/10.1016/j.dib.2018.12.038

Akses Cepat

PDF tidak tersedia langsung

Cek di sumber asli →
Lihat di Sumber doi.org/10.1016/j.dib.2018.12.038
Informasi Jurnal
Tahun Terbit
2019
Sumber Database
DOAJ
DOI
10.1016/j.dib.2018.12.038
Akses
Open Access ✓