|
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
| Volume 187 - Issue 92 |
| Published: March 2026 |
| Authors: Samuel B. Oyong, Uyinomen O. Ekong, Victor E. Ekong |
10.5120/ijca2026926557
|
Samuel B. Oyong, Uyinomen O. Ekong, Victor E. Ekong . A Fuzzy ELECTRE III Method for Mitigating Malware Attacks on Mobile Devices. International Journal of Computer Applications. 187, 92 (March 2026), 21-29. DOI=10.5120/ijca2026926557
@article{ 10.5120/ijca2026926557,
author = { Samuel B. Oyong,Uyinomen O. Ekong,Victor E. Ekong },
title = { A Fuzzy ELECTRE III Method for Mitigating Malware Attacks on Mobile Devices },
journal = { International Journal of Computer Applications },
year = { 2026 },
volume = { 187 },
number = { 92 },
pages = { 21-29 },
doi = { 10.5120/ijca2026926557 },
publisher = { Foundation of Computer Science (FCS), NY, USA }
}
%0 Journal Article
%D 2026
%A Samuel B. Oyong
%A Uyinomen O. Ekong
%A Victor E. Ekong
%T A Fuzzy ELECTRE III Method for Mitigating Malware Attacks on Mobile Devices%T
%J International Journal of Computer Applications
%V 187
%N 92
%P 21-29
%R 10.5120/ijca2026926557
%I Foundation of Computer Science (FCS), NY, USA
Mobile devices are frequently attacked by malware to steal data, credit card information and disrupt operations. The objective of this paper is to develop and hybridize Network intrusion detection system (NIDS) and automated Network intrusion response system (ANIRS) to not only detect malware but provide countermeasures to the attacks and safeguard the target objects. National science laboratory- knowledge discovery in databases (NSL-KDD) dataset was used, although imbalanced. Categorical features such as protocols, services and flags, were converted to numerical values using OneHotEncoder. The dataset was then normalized using min-max normalization technique. Principal component analysis was used to collapse original features to a new but smaller dataset; and then split into training dataset (80%) and test dataset (20%). To develop the NIDS, AdaBoost algorithm was used to train base classifiers such as decision tree, support vector machine and logistic regression, but k-nearest neighbor applied Euclidean distance measure to compute the labels of the target objects. The predictions of the trained models and k-nearest neighbor were aggregated to produce a consensus model called hard vote, which predicts the test dataset to normal and malware labels. Malware labels are grouped into denial of service (DOS), Probe, user to root (U2R) and remote to local (R2L) and passed to ANIRS as input. ANIRS then dynamically generates a set of rules that were used to analyze, prioritize and select optimum response to each attack type. Fuzzy ELECTRE III method was used in prioritizing response actions. Given the imbalanced dataset, the F1-score performance metric of three models that performed best are KNN (91.36%), Hard vote (91.36%) and LR (86.22%). Similarly, countermeasures to malware attacks include DOS: reset connection; Probe: block attacker’s IP address; and U2R and R2L: disable user. This paper successfully prioritized countermeasures to detected intrusions and safeguard the target objects.