Research Article
cHybriDroid: A Machine Learning-Based Hybrid Technique for Securing the Edge Computing
Table 7
Applications features for dynamic analysis.
| No. | Feature | Description |
| 1 | DexClass | Actions of loading external dex function | 2 | Opennet | Facilitate the connection for network | 3 | Service start | Log the services in operation | 4 | Close net | Close network connection | 5 | Send net | Data transmit/sent to the network | 6 | Recvnet | Data received from the network | 7 | Data leaks | Detect leakage of information on the phone including messages, e-mail, password, contacts, IMEI, GPS information phone number, and so on | 8 | Accessed files | File accesses | 9 | Fda ccess | Read and write operations of file and directory | 10 | Send sms | Send SMS | 11 | Phone call | Phone calls made | 12 | Cryptousage | Detect the cryptographic functions and what key is used when encrypting and decrypting data | 13 | Recvaction | APKs function invoked as a receiver | 14 | Enfperm | Enforce special permission to activity, broadcast receiver, and service | 15 | Hashes | The hash value of APK file |
|
|