2017
DOI: 10.1007/s40595-017-0095-3
|View full text |Cite
|
Sign up to set email alerts
|

Computational intelligence anti-malware framework for android OS

Abstract: It is a fact that more and more users are adopting the online digital payment systems via mobile devices for everyday use. This attracts powerful gangs of cybercriminals, which use sophisticated and highly intelligent types of malware to broaden their attacks. Malicious software is designed to run quietly and to remain unsolved for a long time. It manages to take full control of the device and to communicate (via the Tor network) with its Command & Control servers of fastflux botnets' networks to which it belo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 42 publications
0
8
0
Order By: Relevance
“…The λ-NF3 is an effective and innovative intelligence-driven cyber security method. This study has emerged after extensive and long-term research about the network forensics process with cyber-security methodologies and specifically about the network traffic analysis, demystification of malware traffic and encrypted traffic identification [9][10][11][12][13][14][15][16][17]. Significant work has been done using various machine learning methods in various domains.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…The λ-NF3 is an effective and innovative intelligence-driven cyber security method. This study has emerged after extensive and long-term research about the network forensics process with cyber-security methodologies and specifically about the network traffic analysis, demystification of malware traffic and encrypted traffic identification [9][10][11][12][13][14][15][16][17]. Significant work has been done using various machine learning methods in various domains.…”
Section: Literature Reviewmentioning
confidence: 99%
“…REC = TP TP + FN (15) F − Score = 2X PRE X REC PRE + REC (16) Ten-fold cross validation (10_FCV) was employed to measure performance indices. Tables 2-6 present the outcomes of the λ-NF3 method and the equivalent results from competitive algorithms (Support vector Machine (SVM), Multi-Layer Artificial Neural Network (MLFF) ANN, k-Nearest Neighbor (k-NN) and Random Forest (RF)).…”
Section: Batch Data Classification Performancementioning
confidence: 99%
“…NF3 is an artificial intelligence (AI) computer security technique [21][22][23][24][25][26]. Machine learning (ML) methods, using static [27] and dynamic [28] investigation to classify malicious contend [29], to achieve network traffic arrangement [30], to analyze malware traffic [31] and to identify botnets [32], has been done in the past.…”
Section: Related Workmentioning
confidence: 99%
“…A Unix domain socket is a data communications endpoint for exchanging data between processes executing on the same host operating system, and such sockets are a standard component of POSIX operating systems [25,26]. The APIs for Unix domain sockets are similar to those of Internet sockets; however, rather than using an underlying network protocol, all communication occurs entirely within the operating system kernel.…”
Section: Unix Domain Socketsmentioning
confidence: 99%