Research Article
Delving into Android Malware Families with a Novel Neural Projection Method
Table 2
Summary table of DT results: minimum depth of decision nodes for each one of the original features.
| | | Deviance | Gini | Twoing | | ID | Feature | Standard | Curvature | Interaction curvature | Standard | Curvature | Interaction curvature | Standard | Curvature | Interaction curvature | Average |
| 1 | Repackaging | 1 | 2 | 4 | 1 | 2 | 6 | 1 | 2 | 4 | 2.56 | 5 | BOOT | 2 | 3 | 3 | 4 | 3 | 2 | 2 | 3 | 3 | 2.78 | 18 | Encrypted | | 4 | 2 | | 4 | | | 4 | 2 | 3.20 | 9 | USB | 6 | 3 | | 5 | 3 | 4 | 6 | 3 | | 4.29 | 3 | Drive-by Download | 5 | 5 | 4 | 2 | 5 | 6 | 5 | 5 | 4 | 4.56 | 24 | SMS | 4 | 3 | 5 | 10 | 3 | 6 | 3 | 3 | 5 | 4.67 | 26 | User Account | 6 | 1 | 8 | 3 | 1 | 8 | 6 | 1 | 8 | 4.67 | 2 | Update | 5 | 7 | 4 | 2 | 6 | 3 | 5 | 7 | 4 | 4.78 | 19 | NET | 6 | 2 | 8 | 9 | 2 | 3 | 4 | 2 | 8 | 4.89 | 6 | SMS | 3 | 6 | 5 | 8 | 7 | 3 | 3 | 6 | 4 | 5.00 | 10 | PKG | 6 | 5 | | 4 | 5 | 4 | 6 | 5 | | 5.00 | 22 | SMS | 3 | 6 | 4 | 10 | 6 | 4 | 3 | 6 | 4 | 5.11 | 4 | Standalone | 5 | 10 | 3 | 3 | 9 | 3 | 5 | 10 | 3 | 5.67 | 8 | CALL | 4 | | 7 | 4 | | 8 | 4 | | 7 | 5.67 | 11 | BATT | 4 | 9 | | 5 | 4 | 5 | 4 | 9 | | 5.71 | 16 | Ginger Break | | | | 6 | | | | | | 6.00 | 15 | RATC/Zimperlich | 6 | 8 | 1 | 9 | 9 | 8 | 7 | 8 | 1 | 6.33 | 7 | NET | 5 | 8 | 6 | 10 | 9 | 2 | 5 | 8 | 6 | 6.56 | 14 | Exploid | 5 | 8 | 6 | 9 | 6 | 6 | 5 | 8 | 6 | 6.56 | 17 | Asroot | 7 | 4 | 7 | 11 | 4 | 9 | 8 | 4 | 7 | 6.78 | 23 | Block SMS | 3 | 8 | 5 | 9 | 9 | 9 | 4 | 8 | 6 | 6.78 | 25 | Phone Number | 2 | 11 | 2 | 12 | 12 | 11 | 2 | 11 | 2 | 7.22 | 12 | SYS | 5 | 10 | 6 | 10 | 11 | 7 | 5 | 10 | 6 | 7.78 | 21 | Phone Call | 4 | 9 | | 12 | 13 | 7 | 4 | 9 | 5 | 7.88 | 13 | MAIN | 6 | 11 | 7 | 10 | 12 | 1 | 6 | 11 | 7 | 7.89 | 20 | SMS | | | | 10 | | 8 | | | | 9.00 |
|
|