http://10.10.120.238:8080/xmlui/handle/123456789/149
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Faruki P. | en_US |
dc.contributor.author | Buddhadev B. | en_US |
dc.contributor.author | Shah B. | en_US |
dc.contributor.author | Zemmari A. | en_US |
dc.contributor.author | Laxmi V. | en_US |
dc.contributor.author | Gaur M.S. | en_US |
dc.date.accessioned | 2023-11-30T07:35:46Z | - |
dc.date.available | 2023-11-30T07:35:46Z | - |
dc.date.issued | 2019 | - |
dc.identifier.isbn | 978-9811375606 | - |
dc.identifier.issn | 1865-0929 | - |
dc.identifier.other | EID(2-s2.0-85065771015) | - |
dc.identifier.uri | https://dx.doi.org/10.1007/978-981-13-7561-3_10 | - |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/149 | - |
dc.description.abstract | Android, the dominant smart device Operating System (OS) has evolved into a robust smart device platform since its release in 2008. Naturally, cyber criminals leverage fragmentation among varied major release by employing novel attacks. Machine learning is extensively used in System Security. Shallow Learning classifiers tend to over-learn during the training time | en_US |
dc.description.abstract | hence, the model under performs due to dependence on training data during real evaluation. Deep learning has the potential to automate detection of newly discovered malware families that learn the generalization about malware and benign files to be able to detect unseen or zero-day malware attacks. Deep Neural Networks (DNN) have proven performance with image analysis and text classification. In this paper, our proposal DroidDivesDeep D3, a malware classification and app categorization framework models’ low level monitorable features (e.g., CPU, Memory, Network, Sensors etc.). Our proposal employs low level device runtime attributes unlike the existing techniques considering static extraction approach. D3 evaluates a reasonable dataset consisting 24,343 genuine playstore apps against 8,779 real-world Android malware. In fact, the initial results of our proposal are quite encouraging with 98.65% detection rate with 99.79% accuracy during real evaluation. Our proposal improves upon existing techniques by 23%. © Springer Nature Singapore Pte Ltd. 2019. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Springer Verlag | en_US |
dc.source | Communications in Computer and Information Science | en_US |
dc.subject | Android malware | en_US |
dc.subject | Code obfuscation | en_US |
dc.subject | Improbable features | en_US |
dc.subject | Similarity digest | en_US |
dc.subject | Statistical features | en_US |
dc.title | DroidDivesDeep: Android malware classification via low level monitorable features with deep neural networks | en_US |
dc.type | Conference Paper | en_US |
Appears in Collections: | Conference Paper |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.