2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/ 12th IEEE International 2018
DOI: 10.1109/trustcom/bigdatase.2018.00115
|View full text |Cite
|
Sign up to set email alerts
|

NTPDroid: A Hybrid Android Malware Detector Using Network Traffic and System Permissions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 49 publications
(23 citation statements)
references
References 16 publications
0
23
0
Order By: Relevance
“…NTPDroid ( Arora & Peddoju, 2018 ) is a model using Android permissions and network traffic-based features. The aim is to determine the probability of malicious behavior.…”
Section: Literature Reviewmentioning
confidence: 99%
“…NTPDroid ( Arora & Peddoju, 2018 ) is a model using Android permissions and network traffic-based features. The aim is to determine the probability of malicious behavior.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In [40], the authors presented the ‗AdDroid model' that detects malicious activities on a device by analyzing Android actions such as uploading of a file to a server, internet connections, installing packages on the device, etc. In [41], Android malware was detected by observing run-time-related events along with sensitive APIs and permissions by Zhu et al Apart from this, the authors in [42] and [43] proposed two absolutely different hybrid detection techniques by merging and combining the permissions with network traffic features. On similar lines, the authors in [44], [45], and [46] worked on malware detection by analyzing the combination of static and dynamic features.…”
Section: Hybrid Detectionmentioning
confidence: 99%
“…Few solutions exist in the literature that have used hybrid attributes to detect Android malware. Kabakus et al [32] analyzed permissions and the network traffic of the samples and observed that malware samples generate the lesser number of API calls with permissions as compared to the normal ones. The authors in [33] analyzed manifest file components, system calls, and the network traffic to detect malicious activity on smartphones.…”
Section: Hybrid Solutionsmentioning
confidence: 99%