[go: up one dir, main page]

Chen et al., 2018 - Google Patents

Droideye: Fortifying security of learning-based classifier against adversarial android malware attacks

Chen et al., 2018

View PDF
Document ID
18427380960610860104
Author
Chen L
Hou S
Ye Y
Xu S
Publication year
Publication venue
2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)

External Links

Snippet

To combat the evolving Android malware attacks, systems using machine learning techniques have been successfully deployed for Android malware detection. In these systems, based on different feature representations, various kinds of classifiers are …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • G06K9/4671Extracting features based on salient regional features, e.g. Scale Invariant Feature Transform [SIFT] keypoints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6256Obtaining sets of training patterns; Bootstrap methods, e.g. bagging, boosting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
Chen et al. Droideye: Fortifying security of learning-based classifier against adversarial android malware attacks
Islam et al. Android malware classification using optimum feature selection and ensemble machine learning
Ganju et al. Property inference attacks on fully connected neural networks using permutation invariant representations
Chen et al. Adversarial machine learning in malware detection: Arms race between evasion attack and defense
Sinha et al. A high performance hybrid LSTM CNN secure architecture for IoT environments using deep learning
Razak et al. Bio-inspired for features optimization and malware detection
Ye et al. A survey on malware detection using data mining techniques
Chakraborty et al. Ec2: Ensemble clustering and classification for predicting android malware families
Liu et al. ATMPA: attacking machine learning-based malware visualization detection methods via adversarial examples
Zhang et al. Adversarial feature selection against evasion attacks
Dhalaria et al. Android malware detection techniques: A literature review
Pelekis et al. Adversarial machine learning: a review of methods, tools, and critical industry sectors: S. Pelekis et al.
Kirubavathi et al. Behavioral based detection of android ransomware using machine learning techniques
Visalakshi Detecting android malware using an improved filter based technique in embedded software
Panja et al. An efficient malware detection approach based on machine learning feature influence techniques for resource-constrained devices
Habeeb et al. Enhanced android malware detection through artificial neural networks technique
Albishry et al. An attribute extraction for automated malware attack classification and detection using soft computing techniques
Jyothish et al. Effectiveness of machine learning based android malware detectors against adversarial attacks
Li et al. Sok: Arms race in adversarial malware detection
Chen et al. Predicting Android malware combining permissions and API call sequences
Devine et al. An Adversarial Training Based Machine Learning Approach to Malware Classification under Adversarial Conditions.
Zyout et al. Malware classification approaches utilizing binary and text encoding of permissions
Alsumaidaee et al. Optimizing Malware Detection and Classification in Real-Time Using Hybrid Deep Learning Approaches.
Surendran et al. Implementation of dynamic scanner to protect the documents from ransomware using machine learning algorithms
Andrade et al. Malware classification using word embeddings algorithms and long‐short term memory networks