Unravelling Malware Using Co-Existence Of Features

I tiakina i:
Ngā taipitopito rārangi puna kōrero
I whakaputaina i:The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Conference Proceedings vol. 1 (2024)
Kaituhi matua: Omprakash, B
Ētahi atu kaituhi: Metan, Jyoti, Konar, Anisha, Patil, Kavitha S, Chiranthan, K K
I whakaputaina:
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Ngā marau:
Urunga tuihono:Citation/Abstract
Ngā Tūtohu: Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
Whakaahuatanga
Whakarāpopotonga:Conference Title: 2024 Second International Conference on Advances in Information Technology (ICAIT)Conference Start Date: 2024, July 24 Conference End Date: 2024, July 27 Conference Location: Chikkamagaluru, Karnataka, IndiaThis work puts forward machine learning demonstrate depending on co-occurring settled qualities for Mobile adware discovery. Suggested framework suspects Mobile adware asks as aberrant set of occurring permission and application programming interfaces compared to safe apps. For test the premise, we created a novel dataset with occurring permission and application programming interface call on various combination level, specifically the second through fifth levels. The retrieved data of occurring feature in various level were tried on permission alone, application programming interface alone, permission and application programming interface jointly, lastly application programming interface occurrence. For retrieving most pertinent occurring feature, frequently occurring pattern, and association rule method, was utilized. Newly obtained data was derived from Mobile APK sample present in Malgenome Drebin and MalDroid2020 repositories.
DOI:10.1109/ICAIT61638.2024.10690795
Puna:Science Database