Skip navigation

Please use this identifier to cite or link to this item: http://10.10.120.238:8080/xmlui/handle/123456789/149
Full metadata record
DC FieldValueLanguage
dc.contributor.authorFaruki P.en_US
dc.contributor.authorBuddhadev B.en_US
dc.contributor.authorShah B.en_US
dc.contributor.authorZemmari A.en_US
dc.contributor.authorLaxmi V.en_US
dc.contributor.authorGaur M.S.en_US
dc.date.accessioned2023-11-30T07:35:46Z-
dc.date.available2023-11-30T07:35:46Z-
dc.date.issued2019-
dc.identifier.isbn978-9811375606-
dc.identifier.issn1865-0929-
dc.identifier.otherEID(2-s2.0-85065771015)-
dc.identifier.urihttps://dx.doi.org/10.1007/978-981-13-7561-3_10-
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/149-
dc.description.abstractAndroid, the dominant smart device Operating System (OS) has evolved into a robust smart device platform since its release in 2008. Naturally, cyber criminals leverage fragmentation among varied major release by employing novel attacks. Machine learning is extensively used in System Security. Shallow Learning classifiers tend to over-learn during the training timeen_US
dc.description.abstracthence, the model under performs due to dependence on training data during real evaluation. Deep learning has the potential to automate detection of newly discovered malware families that learn the generalization about malware and benign files to be able to detect unseen or zero-day malware attacks. Deep Neural Networks (DNN) have proven performance with image analysis and text classification. In this paper, our proposal DroidDivesDeep D3, a malware classification and app categorization framework models’ low level monitorable features (e.g., CPU, Memory, Network, Sensors etc.). Our proposal employs low level device runtime attributes unlike the existing techniques considering static extraction approach. D3 evaluates a reasonable dataset consisting 24,343 genuine playstore apps against 8,779 real-world Android malware. In fact, the initial results of our proposal are quite encouraging with 98.65% detection rate with 99.79% accuracy during real evaluation. Our proposal improves upon existing techniques by 23%. © Springer Nature Singapore Pte Ltd. 2019.en_US
dc.language.isoenen_US
dc.publisherSpringer Verlagen_US
dc.sourceCommunications in Computer and Information Scienceen_US
dc.subjectAndroid malwareen_US
dc.subjectCode obfuscationen_US
dc.subjectImprobable featuresen_US
dc.subjectSimilarity digesten_US
dc.subjectStatistical featuresen_US
dc.titleDroidDivesDeep: Android malware classification via low level monitorable features with deep neural networksen_US
dc.typeConference Paperen_US
Appears in Collections:Conference Paper

Files in This Item:
There are no files associated with this item.
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.