2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE) 2021
DOI: 10.1109/csde53843.2021.9718396
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Android Malware using Tree-based Ensemble Stacking Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…Hence, the adversarial samples generated in these studies to perform the adversarial training strategy are unrealistic files, as they may not preserve the executable format with malicious behaviour. The authors of [42] explored the performance of a twolevel machine learning model that combines an Ensemble Learning method and a Stacked Generalization method. They show that the proposed model is able to accurately detect recent Android malware.…”
Section: Adversarial Attacks and Defencesmentioning
confidence: 99%
See 1 more Smart Citation
“…Hence, the adversarial samples generated in these studies to perform the adversarial training strategy are unrealistic files, as they may not preserve the executable format with malicious behaviour. The authors of [42] explored the performance of a twolevel machine learning model that combines an Ensemble Learning method and a Stacked Generalization method. They show that the proposed model is able to accurately detect recent Android malware.…”
Section: Adversarial Attacks and Defencesmentioning
confidence: 99%
“…Notably, the study shows that a deep neural network, trained from the original dataset augmented with the synthetic malware samples, gains accuracy in detecting Android malware. However, this study, similar to [21,42], did not explore the robustness of the machine learning model to possible, realistic adversarial samples created to fool the decision model. The authors of [44] explored how a Markov process-based adversarial model, originally formulated for digital rights management (DRM) apps, can be adapted to detect vulnerable iOS devices and analyse (non-DRM) apps for vulnerabilities that can potentially be exploited.…”
Section: Adversarial Attacks and Defencesmentioning
confidence: 99%
“…Shafin et al proposed a robust and efficient Android malware detection and classification system capable of detecting popular malicious attacks of recent times such as banking malware and riskware [15] . For this, the authors assessing the importance of features gives us an insight into contributions of individual features in detecting malware.…”
Section: Related Workmentioning
confidence: 99%
“…This model is also centered on industrial environment where IIoT is used, which can only be seen in the research of Zolanvari, Teixeira and Jain [17] , Khan et al [24] , and Teixeiraeet al [13] ; despite dealing with the industrial scenario, these studies do not have the development of the model as their main proposal. The present proposal also uses ML, as can be seen in the works of Apruzzese et al [14] , Teixeira et al [17] , Pajouh et al [18] , Khoei et al [22] , Liang et al [23] , and Shafinet al [15] , but specifically, using EL to train a more robust model can only be seen in the study of Mohy-Eddine et al [20] . To reduce the model training time, there is still a reduction in the feature size while analyzing the optimization of model training time and possible model retraining without losing performance in predicting attacks on network flows.…”
Section: Khan Et Al Investigated An Ids Model Termed Federated-simple...mentioning
confidence: 99%
See 1 more Smart Citation