2021
DOI: 10.3390/electronics10040519
|View full text |Cite
|
Sign up to set email alerts
|

Deep Learning Techniques for Android Botnet Detection

Abstract: Android is increasingly being targeted by malware since it has become the most popular mobile operating system worldwide. Evasive malware families, such as Chamois, designed to turn Android devices into bots that form part of a larger botnet are becoming prevalent. This calls for more effective methods for detection of Android botnets. Recently, deep learning has gained attention as a machine learning based approach to enhance Android botnet detection. However, studies that extensively investigate the efficacy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 44 publications
(19 citation statements)
references
References 20 publications
0
19
0
Order By: Relevance
“…They presented an approach called smart adaptive particle swarm optimization support vector machine (SAPSO-SVM) based on the top 20 traffic features from the 28-SABD Android botnet dataset. In [17], 342 static features consisting of permissions, intents, extra executable files, API calls, and commands were used in conjunction with deep learning classifiers such as CNN-LSTM, LSTM, GRU and DNN. This study was also based on the 1929 ISCX botnet samples with additional 4873 clean samples.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…They presented an approach called smart adaptive particle swarm optimization support vector machine (SAPSO-SVM) based on the top 20 traffic features from the 28-SABD Android botnet dataset. In [17], 342 static features consisting of permissions, intents, extra executable files, API calls, and commands were used in conjunction with deep learning classifiers such as CNN-LSTM, LSTM, GRU and DNN. This study was also based on the 1929 ISCX botnet samples with additional 4873 clean samples.…”
Section: Related Workmentioning
confidence: 99%
“…understanding permission protection levels). Moreover, our proposed system requires less feature extraction effort compared to the more manual systems presented in [12], [13], [17], [18], [19] and [26] for example. In section III, we describe the proposed system in greater detail.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Botnets pose a threat to network security because they are used in cybercrime techniques such as distributed denial of service (DDoS). Machine learning algorithms are used to track such attacks in IoT [20][21][22]. A botnet can be used to refuse services directed and distributed to any system on the internet so that it cannot properly serve its legitimate customers.…”
Section: Introductionmentioning
confidence: 99%
“…Botnet-based DDoS attacks are devastating for the target network as they will drain all network bandwidth and victim computer resources and cause an interruption of services. Machine learning methods are now commonly used to track these attacks in IoT [20][21][22].…”
Section: Introductionmentioning
confidence: 99%