2018
DOI: 10.1007/978-3-319-72550-5_46
|View full text |Cite
|
Sign up to set email alerts
|

Android Malware Detection Based on Network Traffic Using Decision Tree Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 31 publications
(26 citation statements)
references
References 7 publications
0
26
0
Order By: Relevance
“…is said to belong to one side of the partition F with degree µ F (x) and to the other side with degree (1 − µ F (x)). Since both fuzzy rules [33] and decision tree [43], [44] yield good performance in malware analysis, we hybridize the idea behind these two methods by allowing fuzzy partitions of both types: (i) less than partition x < c, which is the fuzzy version of the ordinary partition for a continuous attribute:…”
Section: A Feature Selectionmentioning
confidence: 99%
“…is said to belong to one side of the partition F with degree µ F (x) and to the other side with degree (1 − µ F (x)). Since both fuzzy rules [33] and decision tree [43], [44] yield good performance in malware analysis, we hybridize the idea behind these two methods by allowing fuzzy partitions of both types: (i) less than partition x < c, which is the fuzzy version of the ordinary partition for a continuous attribute:…”
Section: A Feature Selectionmentioning
confidence: 99%
“…CREDROID [35] identified malicious apps on the basis of Domain Name Server (DNS) queries and the data that are transmitted to remote servers. Zulkifli et al [36] proposed a method for detecting Android malware that is based on seven network traffic features and the J48 decision tree algorithm. Chen et al [37] introduced the imbalanced data gravitation-based classification algorithm for the classification of imbalanced data of malicious apps.…”
Section: Off-device Detectionmentioning
confidence: 99%
“…In our study, only network traffic is considered in Android malware detection. In contrast to previous network-based methods such as [14,[34][35][36], we do not need to model apps' network behaviors in advance, and our method is more useful in practice.…”
Section: Edge Computing Researchmentioning
confidence: 99%
“…This section examines the present static feature work and the dynamic feature research. There are other classify malware based on a machine learning approach [22], [23]. Work by Leder et al [12] proposed a classification of metamorphic variants based on static features.…”
Section: Previous Work On Classification Techniquesmentioning
confidence: 99%