Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
PAIRED: An Explainable Lightweight Android Malware Detection System
Department of Computer Science, Toronto Metropolitan University, Toronto, ON, Canada; School of IT Administration and Security, Seneca College of Applied Arts and Technology, Toronto, ON M2J 2X5, Canada.ORCID iD: 0000-0002-4324-1774
Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Digital Services and Systems. College of Information Technology, United Arab Emirates University, Al Ain, United Arab Emirates; Electrical Engineering Department, Faculty of Engineering, Al-Azhar University, Qena 83513, Egypt; Centre for Security, Communications and Network Research, University of Plymouth, Plymouth PL4 8AA, U.K..ORCID iD: 0000-0002-3800-0757
2022 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 10, p. 73214-73228Article in journal (Refereed) Published
Abstract [en]

With approximately 2 billion active devices, the Android operating system tops all other operating systems in terms of the number of devices using it. Android has gained wide popularity not only as a smartphone operating system, but also as an operating system for vehicles, tablets, smart appliances, and Internet of Things devices. Consequently, security challenges have arisen with the rapid adoption of the Android operating system. Thousands of malicious applications have been created and are being downloaded by unsuspecting users. This paper presents a lightweight Android malware detection system based on explainable machine learning. The proposed system uses the features extracted from applications to identify malicious and benign malware. The proposed system is tested, showing an accuracy exceeding 98% while maintaining its small footprint on the device. In addition, the classifier model is explained using Shapley Additive Explanation (SHAP) values.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2022. Vol. 10, p. 73214-73228
Keywords [en]
Android, malware, malware detection, XAI, machine learning
National Category
Information Systems
Research subject
Information systems
Identifiers
URN: urn:nbn:se:ltu:diva-92479DOI: 10.1109/access.2022.3189645ISI: 000838549700001Scopus ID: 2-s2.0-85134232226OAI: oai:DiVA.org:ltu-92479DiVA, id: diva2:1687351
Note

Validerad;2022;Nivå 2;2022-08-15 (sofila)

Available from: 2022-08-15 Created: 2022-08-15 Last updated: 2025-10-21Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Awad, Ali Ismail

Search in DiVA

By author/editor
Alani, Mohammed M.Awad, Ali Ismail
By organisation
Digital Services and Systems
In the same journal
IEEE Access
Information Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 270 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf