2018
DOI: 10.1109/tifs.2017.2771228
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Android Malware Leveraging Text Semantics of Network Flows

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
55
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 127 publications
(55 citation statements)
references
References 20 publications
0
55
0
Order By: Relevance
“…Lu et al [15] proposed to use decision tree models trained on the n-gram features extracted from the network traffic payload to detect botnets. Wang et al [16] proposed to use lexical features of HTTP header (TCP payload) to discover malicious behaviors of Android botnets.…”
Section: Related Workmentioning
confidence: 99%
“…Lu et al [15] proposed to use decision tree models trained on the n-gram features extracted from the network traffic payload to detect botnets. Wang et al [16] proposed to use lexical features of HTTP header (TCP payload) to discover malicious behaviors of Android botnets.…”
Section: Related Workmentioning
confidence: 99%
“…DroidScribe [18] Runtime behaviors Machine learning 2016 DroidCat [10] Application execution traces Machine learning 2016 CSCdroid [58] Determinate system calls Markov chain and SVM 2017 Monet [52] Runtime behavior signature Signature matching 2017 Wang et al [55] HTTP proposed DroidMat, a system that extracts the information from each application's manifest file, and regards components as entry points to trace API calls related to permissions [56]. MAMA extracts permission and uses-feature tags from the application's manifest content and uses machine learning methods to distinguish benign applications from malwares [46].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Sun et al proposed Monet framework that includes both client and server modules and uses both runtime behavior and static structures to detect malware variants [52]. Wang et al proposed a dynamic method which uses text semantic features of mobile traffic for malware detection [55]. This method considers every HTTP flow as a document and then uses n-grams to generate candidate features for machine learning model.…”
Section: Dynamic Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…In addition to malware as a general concept, there are novel systems to deal with particular types of malware [49,50]. In both cases, learning-based systems show very promising results [51,52,53,54].…”
Section: Related Workmentioning
confidence: 99%