Empirical evaluation of minority oversampling techniques in the context of Android malware detection

In Android malware classification, the distribution of training data among classes is often imbalanced. This causes the learning algorithm to bias towards the dominant classes, resulting in mis-classification of minority classes. One effective way to improve the performance of classifiers is the syn...

Full description

Saved in:
Bibliographic Details
Main Authors: SHAR, Lwin Khin, TA, Nguyen Binh Duong, LO, David
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2021
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/6852
https://ink.library.smu.edu.sg/context/sis_research/article/7855/viewcontent/Smote_2021.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-7855
record_format dspace
spelling sg-smu-ink.sis_research-78552022-05-10T05:07:37Z Empirical evaluation of minority oversampling techniques in the context of Android malware detection SHAR, Lwin Khin TA, Nguyen Binh Duong LO, David In Android malware classification, the distribution of training data among classes is often imbalanced. This causes the learning algorithm to bias towards the dominant classes, resulting in mis-classification of minority classes. One effective way to improve the performance of classifiers is the synthetic generation of minority instances. One pioneer technique in this area is Synthetic Minority Oversampling Technique (SMOTE) and since its publication in 2002, several variants of SMOTE have been proposed and evaluated on various imbalanced datasets. However, these techniques have not been evaluated in the context of Android malware detection. Studies have shown that the performance of SMOTE and its variants can vary across different application domains. In this paper, we conduct a large scale empirical evaluation of SMOTE and its variants on six different datasets that reflect six types of features commonly used in Android malware detection. The datasets are extracted from a benchmark of 4,572 benign apps and 2,399 malicious Android apps, used in our previous study. Through extensive experiments, we set a new baseline in the field of Android malware detection, and provide guidance to practitioners on the application of different SMOTE variants to Android malware detection. 2021-12-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/6852 info:doi/10.1109/APSEC53868.2021.00042 https://ink.library.smu.edu.sg/context/sis_research/article/7855/viewcontent/Smote_2021.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Malware detection Oversampling Imbalanced learning SMOTE SMOTE variants Android malware Databases and Information Systems Software Engineering
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Malware detection
Oversampling
Imbalanced learning
SMOTE
SMOTE variants
Android malware
Databases and Information Systems
Software Engineering
spellingShingle Malware detection
Oversampling
Imbalanced learning
SMOTE
SMOTE variants
Android malware
Databases and Information Systems
Software Engineering
SHAR, Lwin Khin
TA, Nguyen Binh Duong
LO, David
Empirical evaluation of minority oversampling techniques in the context of Android malware detection
description In Android malware classification, the distribution of training data among classes is often imbalanced. This causes the learning algorithm to bias towards the dominant classes, resulting in mis-classification of minority classes. One effective way to improve the performance of classifiers is the synthetic generation of minority instances. One pioneer technique in this area is Synthetic Minority Oversampling Technique (SMOTE) and since its publication in 2002, several variants of SMOTE have been proposed and evaluated on various imbalanced datasets. However, these techniques have not been evaluated in the context of Android malware detection. Studies have shown that the performance of SMOTE and its variants can vary across different application domains. In this paper, we conduct a large scale empirical evaluation of SMOTE and its variants on six different datasets that reflect six types of features commonly used in Android malware detection. The datasets are extracted from a benchmark of 4,572 benign apps and 2,399 malicious Android apps, used in our previous study. Through extensive experiments, we set a new baseline in the field of Android malware detection, and provide guidance to practitioners on the application of different SMOTE variants to Android malware detection.
format text
author SHAR, Lwin Khin
TA, Nguyen Binh Duong
LO, David
author_facet SHAR, Lwin Khin
TA, Nguyen Binh Duong
LO, David
author_sort SHAR, Lwin Khin
title Empirical evaluation of minority oversampling techniques in the context of Android malware detection
title_short Empirical evaluation of minority oversampling techniques in the context of Android malware detection
title_full Empirical evaluation of minority oversampling techniques in the context of Android malware detection
title_fullStr Empirical evaluation of minority oversampling techniques in the context of Android malware detection
title_full_unstemmed Empirical evaluation of minority oversampling techniques in the context of Android malware detection
title_sort empirical evaluation of minority oversampling techniques in the context of android malware detection
publisher Institutional Knowledge at Singapore Management University
publishDate 2021
url https://ink.library.smu.edu.sg/sis_research/6852
https://ink.library.smu.edu.sg/context/sis_research/article/7855/viewcontent/Smote_2021.pdf
_version_ 1770576107259559936