2021 Fifth World Conference on Smart Trends in Systems Security and Sustainability (WorldS4) 2021
DOI: 10.1109/worlds451998.2021.9513992
|View full text |Cite
|
Sign up to set email alerts
|

RPNDroid: Android Malware Detection using Ranked Permissions and Network Traffic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(5 citation statements)
references
References 26 publications
0
5
0
Order By: Relevance
“…Windowed sequence statistical features: Maintaining packet time intervals and packet lengths in separate windows for outbound and inbound traffic, extracting statistical features for each window such as mean, standard deviation, maximum, and minimum values. Additionally, employing a Markov transition matrix to capture relationships between adjacent packets [8] .…”
Section: Flow-level Featuresmentioning
confidence: 99%
“…Windowed sequence statistical features: Maintaining packet time intervals and packet lengths in separate windows for outbound and inbound traffic, extracting statistical features for each window such as mean, standard deviation, maximum, and minimum values. Additionally, employing a Markov transition matrix to capture relationships between adjacent packets [8] .…”
Section: Flow-level Featuresmentioning
confidence: 99%
“…Permissions are a major source of malware infection [11], [12] [13], [14]. Studies that use permissions for malware detection generate attribute feature vectors from the AndroidManifest.xml file where a one is assigned if the permission is present; otherwise, a zero is assigned [15], [16][17]- [19]. Other studies use text classification techniques such as Term Frequency-Inverse Document Frequency [6].…”
Section: Static Analysismentioning
confidence: 99%
“…They found an imbalanced data problem, that was, the most network traffic generated by malwares was normal and only a small proportion of the network traffic was malicious [31]. Upadhayay et al [32] proposed a model that detected and mined the network traffic patterns of each APP and built a classification model that took the traffic patterns as input. Fallah et al [33] proposed a malware detection method based on LSTM and network traffic analysis, which distinguished malwares and benignwares, and detected unseen malware families.…”
Section: Network Traffic Analysis-based Detectionmentioning
confidence: 99%
“…Upadhayay et al. [32] proposed a model that detected and mined the network traffic patterns of each APP and built a classification model that took the traffic patterns as input. Fallah et al.…”
Section: Related Workmentioning
confidence: 99%