Android malware classification based on random vector functional link and artificial Jellyfish Search optimizer

PLoS One. 2021 Nov 19;16(11):e0260232. doi: 10.1371/journal.pone.0260232. eCollection 2021.

Abstract

Smartphone usage is nearly ubiquitous worldwide, and Android provides the leading open-source operating system, retaining the most significant market share and active user population of all open-source operating systems. Hence, malicious actors target the Android operating system to capitalize on this consumer reliance and vulnerabilities present in the system. Hackers often use confidential user data to exploit users for advertising, extortion, and theft. Notably, most Android malware detection tools depend on conventional machine-learning algorithms; hence, they lose the benefits of metaheuristic optimization. Here, we introduce a novel detection system based on optimizing the random vector functional link (RVFL) using the artificial Jellyfish Search (JS) optimizer following dimensional reduction of Android application features. JS is used to determine the optimal configurations of RVFL to improve classification performance. RVFL+JS minimizes the runtime of the execution of the optimized models with the best performance metrics, based on a dataset consisting of 11,598 multi-class applications and 471 static and dynamic features.

MeSH terms

  • Algorithms
  • Benchmarking / methods
  • Computer Security*
  • Machine Learning
  • Smartphone* / instrumentation
  • Software

Grants and funding

The author(s) received no specific funding for this work.