Research Article

A Case-Based Reasoning Approach for Automatic Adaptation of Classifiers in Mobile Phishing Detection

Table 3

Feature sets.

NoFeature setsNumber of featuresExample features

1Android components76android.media, android.media.effect, android.media.audiofx, android.service.textservice, android.service.notification
2API counts31account_information, account_settings, audio, bluetooth, bluetooth_information
3API usage actions82android.util, android.widget, android.renderscript, android.webkit, android.os, android.os.storage, android.content
4Security-sensitive flows421system_settings____audio, system_settings____phone_connection, system_settings____voip, system_settings____database_information
5Hardware components6android.hardware.display, android.hardware, android.hardware.usb, android.hardware.location, android.hardware.input
6Intent_action109action_main, action_view, action_default, action_attach_data, action_edit, action_insert_or_edit
7Permission82android.permission.access_cache_filesystem, android.permission.access_checkin_properties, android.permission.access_coarse_location, android.permission.access_gps
8Shell_command_strings190runtime.exec, createSubprocess, cipher-classes, longstring, SecretKey, method.invoke, small_code_size
9Content_visual19HostnameLength, PathLength, QueryLength, DoubleSlashInPath, NumSensitiveWords, EmbeddedBrandName, PctExtHyperlinks,
10URLs49having_ip_address, url_length, shortining_service, having_at_symbol, double_slash_redirecting, prefix_suffix,
Total1,065ā€‰