Android Malware Detection Using Backpropagation Neural Network
نویسندگان
چکیده
منابع مشابه
Android Malware Detection Using Backpropagation Neural Network
The rapid growing adoption of android operating system around the world affects the growth of malware that attacks this platform. One possible solution to overcome the threat of malware is building a comprehensive system to detect existing malware. This paper proposes multilayer perceptron artificial neural network trained with backpropagation algorithm to determine an application is malware or...
متن کاملAndroid Malware Detection Using SVM and GA
Security is one of the main concerns for Smartphone users today. As the power and features of Smartphone’s increase, so has their vulnerability for attacks by viruses etc. An Android OS could be attacked by hackers: Because it’s Open platform, Users will access the Internet intensively and everyone can develop applications for Android. In previous technique described that how security can be im...
متن کاملDroidMat: Android Malware Detection
Recently, the threat of Android malware is spreading rapidly, especially those repackaged Android malware. Although understanding Android malware using dynamic analysis can provide a comprehensive view, it is still subjected to high cost in environment deployment and manual efforts in investigation. In this study, we propose a static feature-based mechanism to provide a static analyst paradigm ...
متن کاملPermission-Based Android Malware Detection
Mobile devices have become popular in our lives since they offer almost the same functionality as personal computers. Among them, Android-based mobile devices had appeared lately and, they were now an ideal target for attackers. Android-based smartphone users can get free applications from Android Application Market. But, these applications were not certified by legitimate organizations and the...
متن کاملTrends In Android Malware Detection
This paper analyzes different Android malware detection techniques from several research papers, some of these techniques are novel while others bring a new perspective to the research work done in the past. The techniques are of various kinds ranging from detection using host based frameworks and static analysis of executable to feature extraction and behavioral patterns. Each paper is reviewe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science
سال: 2016
ISSN: 2502-4760,2502-4752
DOI: 10.11591/ijeecs.v4.i1.pp240-244