{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T07:41:00Z","timestamp":1753602060312,"version":"3.40.5"},"reference-count":32,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,12,14]]},"abstract":"<jats:p>In order to improve the accuracy and efficiency of Android malware detection, an Android malware detection model based on decision tree (DT) with support vector machine (SVM) algorithm (DT-SVM) is proposed. Firstly, the original opcode, Dalvik opcode, is extracted by reversing Android software, and the eigenvector of the sample is generated by using the n-gram model. Then, a decision tree is generated via training the sample and updating decision nodes as SVM nodes from the bottom up according to the evaluation result of the test set in the decision path. The model effectively combines DT with SVM. Under the premise of maintaining a high-accuracy decision path, SVM is used to effectively reduce the overfitting problem in DT and thus improve the generalization ability, and maintain the superiority of SVM for the small sample training set. Finally, to test our approach, several simulation experiments are carried out, and the results demonstrate that the improved algorithm has better accuracy and higher speed as compared with other malware detection approaches.<\/jats:p>","DOI":"10.1155\/2020\/8841233","type":"journal-article","created":{"date-parts":[[2020,12,15]],"date-time":"2020-12-15T17:50:09Z","timestamp":1608054609000},"page":"1-11","source":"Crossref","is-referenced-by-count":12,"title":["An Android Malware Detection Model Based on DT-SVM"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2589-4966","authenticated-orcid":true,"given":"Min","family":"Yang","sequence":"first","affiliation":[{"name":"College of Cybersecurity, Sichuan University, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8705-2617","authenticated-orcid":true,"given":"Xingshu","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Cybersecurity and the Cybersecurity Research Institute, Sichuan University, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2866-3757","authenticated-orcid":true,"given":"Yonggang","family":"Luo","sequence":"additional","affiliation":[{"name":"College of Cybersecurity and the Cybersecurity Research Institute, Sichuan University, Chengdu, China"}]},{"given":"Hang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Technology and Engineering Group, Tencent, Shenzhen, China"}]}],"member":"311","reference":[{"key":"1","unstructured":"InsightsD.Tech Trends 2019 beyond the Digital Frontier2019London, UKDeloitteTech. Rep.https:\/\/www.innovation4.cn\/library\/r37176"},{"key":"2","unstructured":"EghamU. K.Gartner says worldwide smartphone sales will grow 3Gartner, UK2020Stamford, CT, USAGartnerTech. Rep.https:\/\/www.gartner.com"},{"key":"3","first-page":"1207","article-title":"Android application security","volume":"10","author":"R. Mente","year":"05 2017","journal-title":"Advances in Computational Sciences and Technology"},{"key":"4","unstructured":"EghamU. K.Gartner says worldwide sales of smartphones recorded first ever decline during the fourth quarter of 2017Stamford, CT, USAGartnerTech. Rep.https:\/\/www.gartner.com\/newsroom\/id\/3876865"},{"key":"5","unstructured":"CenterI. S.Android malware special report in 20182019Beijing, China360 Fenghuo LaboratoryTech. Rep.https:\/\/zt.360.cn\/1101061855.php?dtid\u01411101061451&did\u0141610100815"},{"key":"6","first-page":"1","article-title":"Droidfusion: A novel multilevel classifier fusion approach for android malware detection","volume":"99","author":"S. Y. Yerima","year":"2018","journal-title":"IEEE Transactions on Cybernetics"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2700270"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.02.013"},{"article-title":"Malware dynamic analysis evasion techniques: a survey","year":"2018","author":"A. Afianian","key":"9"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.07.023"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.04.064"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.11.028"},{"key":"13","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1016\/j.future.2018.11.021","article-title":"A machine learning based approach to detect malicious android apps using discriminant system calls","volume":"94","author":"P. Vinod","year":"2019","journal-title":"Future Generation Computer Systems"},{"issue":"1","key":"14","first-page":"42","article-title":"Android malware detection based on svm","volume":"47","author":"Y. Zhang","year":"2017","journal-title":"Journal of Shandong University (Engineering Science)"},{"issue":"5","key":"15","first-page":"190","article-title":"Android malware detection based on apk signature information feedback","volume":"38","author":"X. Liu","year":"2017","journal-title":"Journal on Communications"},{"issue":"4","key":"16","first-page":"8","article-title":"Android malware detection based on improved random forest","volume":"38","author":"H. Yang","year":"2017","journal-title":"Journal on Communications"},{"issue":"4","key":"17","first-page":"1970","article-title":"Android malware detection using decision trees and network traffic","volume":"7","author":"D. Nancy","year":"2016","journal-title":"International Journal of Computer Science and Information Technologies"},{"key":"18","article-title":"Dl-droid: deep learning based android malware detection using real devices","volume":"89","author":"A. Mohammed K","year":"2019","journal-title":"Computers & Security"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2018.2822680"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-0803-6"},{"issue":"11","key":"21","doi-asserted-by":"crossref","first-page":"1869","DOI":"10.1109\/TIFS.2014.2353996","article-title":"Exploring permission-induced risk in android applications for malicious application detection","volume":"9","author":"W. Wang","year":"2017","journal-title":"IEEE Transactions on Information Forensics & Security"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2019.2903186"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2909745"},{"first-page":"204","article-title":"Unknown malcode detection using opcode representation","author":"R. Moskovitch","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"first-page":"144","article-title":"A training algorithm for optimal margin classifiers","author":"B. E. Boser","key":"26"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/bf00116251"},{"issue":"9","key":"28","article-title":"Application of machine learning in cyberspace security research","volume":"41","year":"2018","journal-title":"Chinese Journal of Computers"},{"first-page":"202","article-title":"Dynamic permissions based android malware detection using machine learning techniques","author":"A. Mahindru","key":"29"},{"key":"30","first-page":"23","article-title":"Drebin: effective and explainable detection of android malware in your pocket","volume":"14","author":"D. Arp","year":"2014","journal-title":"In Ndss"},{"article-title":"Deep android malware detection","author":"N. Mclaughlin","key":"31","doi-asserted-by":"crossref","DOI":"10.1145\/3029806.3029823"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.3233\/jifs-169424"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8841233.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8841233.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8841233.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,15]],"date-time":"2020-12-15T17:50:24Z","timestamp":1608054624000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8841233\/"}},"subtitle":[],"editor":[{"given":"Zhe-Li","family":"Liu","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,12,14]]},"references-count":32,"alternative-id":["8841233","8841233"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8841233","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2020,12,14]]}}}