咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Investigation of Android Malwa... 收藏

Investigation of Android Malware with Machine Learning Classifiers using Enhanced PCA Algorithm

作     者:V.Joseph Raymond R.Jeberson Retna Raj 

作者机构:Department of Computer Science and EngineeringSathyabama Institute of Science and TechnologyChennai600119TamilnaduIndia School of ComputingSRM Institute of Science and TechnologyChennai603203TamilnaduIndia 

出 版 物:《Computer Systems Science & Engineering》 (计算机系统科学与工程(英文))

年 卷 期:2023年第44卷第3期

页      面:2147-2163页

核心收录:

学科分类:12[管理学] 1201[管理学-管理科学与工程(可授管理学、工学学位)] 081104[工学-模式识别与智能系统] 0839[工学-网络空间安全] 08[工学] 0835[工学-软件工程] 0811[工学-控制科学与工程] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

主  题:Zero-day exploit hybrid analysis principal component analysis supervised learning smart cities 

摘      要:Android devices are popularly available in the commercial market at different price levels for various levels of *** Android stack is more vulnerable compared to other platforms because of its open-source *** are many android malware detection techniques available to exploit the source code andfind associated components during execution *** obtain a better result we create a hybrid technique merging static and dynamic *** this paper,in thefirst part,we have proposed a technique to check for correlation between features and classify using a supervised learning approach to avoid Mul-ticollinearity problem is one of the drawbacks in the existing *** the proposed work,a novel PCA(Principal Component Analysis)based feature reduction technique is implemented with conditional dependency features by gathering the functionalities of the application which adds novelty for the given *** Android Sensitive Permission is one major key point to be considered while detecting *** select vulnerable columns based on features like sensitive permissions,application program interface calls,services requested through the kernel,and the relationship between the variables henceforth build the model using machine learning classifiers and identify whether the given application is malicious or *** goal of this paper is to check benchmarking datasets collected from various repositories like virus share,Github,and the Canadian Institute of cyber security,compare with models ensuring zero-day exploits can be monitored and detected with better accuracy rate.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分