Android Malware Detection using Machine Learning

Android Malware Detection using Machine Learning

The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book. The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency to common obfuscation techniques; (3) the portability over different platforms and architectures. First, the authors propose an approximate fingerprinting technique for android packaging that captures the underlying static structure of the android applications in the context of bulk and offline detection at the app-market level. This book proposes a malware clustering framework to perform malware clustering by building and partitioning the similarity network of malicious applications on top of this fingerprinting technique. Second, the authors propose an approximate fingerprinting technique that leverages dynamic analysis and natural language processing techniques to generate Android malware behavior reports. Based on this fingerprinting technique, the authors propose a portable malware detection framework employing machine learning classification. Third, the authors design an automatic framework to produce intelligence about the underlying malicious cyber-infrastructures of Android malware. The authors then leverage graph analysis techniques to generate relevant intelligence to identify the threat effects of malicious Internet activity associated with android malware. The authors elaborate on an effective android malware detection system, in the online detection context at the mobile device level. It is suitable for deployment on mobile devices, using machine learning classification on method call sequences. Also, it is resilient to common code obfuscation techniques and adaptive to operating systems and malware change overtime, using natural language processing and deep learning techniques. Researchers working in mobile and network security, machine learning and pattern recognition will find this book useful as a reference. Advanced-level students studying computer science within these topic areas will purchase this book as well.


Author
Publisher Springer Nature
Release Date
ISBN 303074664X
Pages 202 pages
Rating 4/5 (43 users)
Read More

More Books:

Android Malware Detection using Machine Learning
Language: en
Pages: 202
Authors: ElMouatez Billah Karbab
Categories: Computers
Type: BOOK - Published: 2021-07-10 - Publisher: Springer Nature

The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book. The authors emphasize th
Malware and Raspberry Pi 2
Language: en
Pages: 48
Authors: Solis Tech
Categories:
Type: BOOK - Published: 2016-02-03 - Publisher: Createspace Independent Publishing Platform

Is Malware what you want to learn? Always wondered how Malware works? Does it interest you how viruses compromise your computer? Download Malware to discover ev
Full Circle Magazine #94
Language: en
Pages: 50
Authors: Ronnie Tucker
Categories:
Type: BOOK - Published: 2015-02-27 - Publisher: Full Circle Magazine

This month: * Command & Conquer * How-To : Block Calls, LibreOffice, and Using i2P * Graphics : Inkscape. * Linux Labs: BTRFS * Book Review: Practical Data Scie
Hacking + Malware + Raspberry Pi 2
Language: en
Pages: 144
Authors: Solis Tech
Categories:
Type: BOOK - Published: 2016-02-21 - Publisher: Createspace Independent Publishing Platform

" Is hacking what you want to learn? Always wondered how one becomes a hacker? Does it interest you how hackers never seem to get caught?" " Purchase Hacking to
Ubiquitous Security
Language: en
Pages:
Authors: Guojun Wang
Categories:
Type: BOOK - Published: - Publisher: Springer Nature

Detection of Intrusions and Malware, and Vulnerability Assessment
Language: en
Pages: 504
Authors: Roberto Perdisci
Categories: Computers
Type: BOOK - Published: 2019-06-10 - Publisher: Springer

This book constitutes the proceedings of the 16th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2019, hel
Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities
Language: en
Pages: 262
Authors: Nadia Nedjah
Categories: Technology & Engineering
Type: BOOK - Published: 2022-03-28 - Publisher: Springer Nature

This book bridges principles and real-world applications, while also providing thorough theory and technology for the development of artificial intelligence and
Meet the Raspberry Pi
Language: en
Pages: 420
Authors: Eben Upton
Categories: Computers
Type: BOOK - Published: 2012-07-12 - Publisher: John Wiley & Sons

The essential preview guide to getting started with Raspberry Pi ® computing and programming Originally conceived of as a fun, easy way for kids (and curious a
Advances in Computer Science and Ubiquitous Computing
Language: en
Pages: 605
Authors: James J. Park
Categories: Technology & Engineering
Type: BOOK - Published: 2021-01-04 - Publisher: Springer Nature

This book presents the combined proceedings of the 11th International Conference on Computer Science and its Applications (CSA 2019) and the 14th KIPS Internati
Computer Security – ESORICS 2021
Language: en
Pages: 782
Authors: Elisa Bertino
Categories: Computers
Type: BOOK - Published: 2021-09-29 - Publisher: Springer Nature

The two volume set LNCS 12972 + 12973 constitutes the proceedings of the 26th European Symposium on Research in Computer Security, ESORICS 2021, which took plac