فیلترها/جستجو در نتایج    

فیلترها

سال

بانک‌ها




گروه تخصصی











متن کامل


اطلاعات دوره: 
  • سال: 

    2024
  • دوره: 

    10
تعامل: 
  • بازدید: 

    31
  • دانلود: 

    0
چکیده: 

The increasing expansion of mobile phones along with the expansion of the possibilities of these phones has provided a suitable field for information theft. Android is undoubtedly the most popular and widespread operating system of mobile phones, which has become the target audience of many Malware authors due to this expansion. This article seeks to provide a suitable and powerful solution for detecting Malware. Data processing uses a combined feature selection operation. This idea extracts the most important features and improves the accuracy and speed of Detection. Then, three-level stacking is used for the Detection stage. This method can significantly improve the accuracy and power of generalization compared to other methods based on the innovative idea of dataset separation. The accuracy of this method is equal to 99. 5.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 31

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0
نویسندگان: 

DEYPIR MAHMOOD | SHARIFI EHSAN

اطلاعات دوره: 
  • سال: 

    2016
  • دوره: 

    4
  • شماره: 

    4
  • صفحات: 

    244-254
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    254
  • دانلود: 

    0
چکیده: 

Android has been targeted by Malware developers since it has emerged as widest used operating system for smartphones and mobile devices. Android security mainly relies on user decisions regarding to installing applications (apps) by approving their requested permissions. Therefore, a systematic user assistance mechanism for making appropriate decisions can significantly improve the security of Android based devices by preventing malicious apps installation. However, the criticality of permissions and the security risk values of apps are not well determined for users in order to make correct decisions. In this study, a new metric is introduced for effective risk computation of untrusted apps based on their required permissions. The metric leverages both frequency of permission usage in Malwares and rarity of them in normal apps. Based on the proposed metric, an algorithm is developed and implemented for identifying critical permissions and effective risk computation. The proposed solution can be directly used by the mobile owners to make better decisions or by Android markets to filter out suspicious apps for further examination. Empirical evaluations on real malicious and normal app samples show that the proposed metric has high Malware Detection rate and is superior to recently proposed risk score measurements. Moreover, it has good performance on unseen apps in term of security risk computation.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 254

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
اطلاعات دوره: 
  • سال: 

    2022
  • دوره: 

    14
  • شماره: 

    3
  • صفحات: 

    51-59
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    70
  • دانلود: 

    0
چکیده: 

With the widespread use of Android smartphones, the Android platform has become an attractive target for cybersecurity attackers and Malware authors. Meanwhile, the growing emergence of zero-day Malware has long been a major concern for cybersecurity researchers. This is because Malware that has not been seen before often exhibits new or unknown behaviors, and there is no documented defense against it. In recent years, deep learning has become the dominant machine learning technique for Malware Detection and could achieve outstanding achievements. Currently, most deep Malware Detection techniques are supervised in nature and require training on large datasets of benign and malicious samples. However, supervised techniques usually do not perform well against zero-day Malware. Semi-supervised and unsupervised deep Malware Detection techniques have more potential to detect previously unseen Malware. In this paper, we present MalGAE, a novel end-to-end deep Malware Detection technique that leverages one-class graph neural networks to detect Android Malware in a semi-supervised manner. MalGAE represents each Android application with an attributed function call graph (AFCG) to benefit the ability of graphs to model complex relationships between data. It builds a deep one-class classifier by training a stacked graph autoencoder with graph convolutional layers on benign AFCGs. Experimental results show that MalGAE can achieve good Detection performance in terms of different evaluation measures.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 70

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
نویسنده: 

manifard Ali | MAJIDI BABAK

اطلاعات دوره: 
  • سال: 

    2024
  • دوره: 

    10
تعامل: 
  • بازدید: 

    41
  • دانلود: 

    0
چکیده: 

Android devices are providing about 70% of the web traffic. Therefore, the security of the Android devices is one of the major factors impacting the web security. Autonomous Detection of the Malware infecting Android devices using machine learning methods can act as a scalable solution for security provision on smartphones. This study aims to introduce an innovative approach for detecting mobile phone Malware by leveraging users' emotional reactions and interactions with their devices during sudden and unpredictable events. Traditional mobile Malware Detection methods that rely on permissions and API calls have extensively been researched, yet they often overlook human elements such as emotions and their potential implications in this context. The methodology proposed in this research involves capturing users' reactive behaviors to unexpected events using Natural Language Processing (NLP), analyzing their interactive patterns with mobile phones through clustering techniques, and employing machine learning algorithms and classification methods for Malware Detection. The experimental results show that the proposed method can provide an accuracy of more than 96% which provides an efficient tool for Android and web security.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 41

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0
اطلاعات دوره: 
  • سال: 

    2021
  • دوره: 

    7
تعامل: 
  • بازدید: 

    130
  • دانلود: 

    0
چکیده: 

Users of smartphones in the world has grown significantly, and attacks against these devices have increased. Many protection techniques for Android Malware Detection have been proposed; however, most of them lack the early Detection of Malware. Hence, there is an intense need before to expand a mechanism to identify malicious programs before utilizing the data. Moreover, achieving high accuracy in detecting Android Malware traffic is another critical problem. This research proposes a deep learning framework using network traffic features to detect Android Malware. Commonly, machine learning algorithms need data preprocessing, but these preprocessing phases are time-consuming. Deep learning techniques remove the need for data preprocessing, and they perform well on Malware Detection problems. We extract local features from network flows by using the one-dimensional CNN and employ LSTM to detect the sequential relationship between the considerable features. We utilize a real-world dataset CICAndMal2017 with network traffic features to identify Android Malware. Our model achieves the accuracy of 99. 79, 98. 90%, and 97. 29%, respectively, in binary, category, and family classifications scenarios.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 130

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0
اطلاعات دوره: 
  • سال: 

    1404
  • دوره: 

    23
  • شماره: 

    80
  • صفحات: 

    47-57
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    20
  • دانلود: 

    0
چکیده: 

استفاده از تلفن های همراه با سیستم عامل اندروید روز به روز در حال گسترش است. سیستم عامل اندروید به خودی خود ابزار قدرتمندی برای تشخیص بدافزار ندارد. از این رو، مهاجمان به راحتی از طریق گوشی تلفن همراه افراد وارد حریم خصوصی آنها شده و آنها را در معرض خطر جدی قرار می دهند. تاکنون تحقیقات زیادی بر روی تشخیص بدافزار صورت گرفته است. یکی از مشکلات عمده این راهکارها، دقت پایین در تشخیص چند کلاسه روی مجموعه داده ها و یا عدم حصول نتیجه مطلوب در هر دو نوع تشخیص دودویی و چند کلاسه است. در این مقاله با استفاده از شبکه عصبی کانولوشن (CNN) و تغییر در تعداد لایه های مختلف، سعی کرده ایم تا حداکثر تعداد ویژگی های مهم را از مجموعه داده استخراج نماییم. در فاز طبقه بندی داده ها نیز از الگوریتم یادگیری شبکه حافظه طولانی کوتاه مدت (LSTM) استفاده می کنیم تا با آزمایش آن بر روی ویژگی های انتخاب شده، داده ها با حداکثر دقت ممکن طبقه بندی شوند. نتایج آزمایش بر روی مجموعه داده جدید MalMemAnalysis-2022 نشان می دهد که استفاده از این دو الگوریتم و تغییر در تعداد لایه ها می تواند در بهترین حالت به ترتیب منجر به دقت های 99.99% و 71.99% در دسته-بندی دودویی و چند کلاسه در تشخیص بدافزار شود که نسبت به روش های موجود برتری دارد.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 20

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
عنوان: 
نویسندگان: 

اطلاعات دوره: 
  • سال: 

    1401
  • دوره: 

  • شماره: 

  • صفحات: 

    -
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    38
  • دانلود: 

    0
کلیدواژه: 
چکیده: 

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 38

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
اطلاعات دوره: 
  • سال: 

    2021
  • دوره: 

    13
  • شماره: 

    2
  • صفحات: 

    131-143
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    89
  • دانلود: 

    0
چکیده: 

Dynamic analysis is a prominent approach in analyzing the behavior of Android apps. To perform dynamic analysis, we need an event generator to provide proper environment for executing the app in an emulator. Monkey is the most popular event generator for Android apps in general, and is used in dynamic analysis of Android Malware as well. Monkey provides high code coverage and yet high speed in generating events. However, in the case of Malware analysis, Monkey su ers from several limitations. It only considers UI events but no system events, and because of random behavior in generating UI events, it may lose dropping the connectivity of the test environment during the analysis process. Moreover, it provides no defense against Malware evasion techniques. In this paper, we try to enhance Monkey by reducing its limitations while preserving its advantages. The proposed approach has been implemented as an extended version of Monkey, named Curious-Monkey. Curious-Monkey provides facilities for handling system events, handling evasion techniques, and keeping the test environment's connectivity up during the analysis process. We conducted many experiments to evaluate the e ectiveness of the proposed tool regarding two important criteria in dynamic Malware analysis: the ability to trigger malicious payloads and the code coverage. In the evaluation process, we used the Evadroid benchmark and the AMD Malware data-set. Moreover, we compared Curious-Monkey with Monkey and Ares tools. The results show that the Curious-Monkey provides better results in case of triggering malicious payloads, as well as better code coverage.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 89

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
نویسندگان: 

Mozafari Somayeh | Jalaly Bidgoly Amir

اطلاعات دوره: 
  • سال: 

    2022
  • دوره: 

    14
  • شماره: 

    3
  • صفحات: 

    81-92
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    63
  • دانلود: 

    0
چکیده: 

Today, with the advancement of science and technology, the use of smartphones has become very common, and the Android operating system has been able to gain lots of popularity in the meantime. However, these devices face many security challenges, including Malware. Malware may cause many problems in both the security and privacy of users. So far, the state-of-the-art method in Malware Detection is based on deep learning, however, this approach requires a lot of computing resources and leads to high battery usage, which is unacceptable in smartphone devices. This paper proposes the knowledge distillation approach for lightening Android Malware Detection. To this end, first, a heavy model is taught and then with the knowledge distillation approach, its knowledge is transferred to a light model called student. To simplify the learning process, soft labels are used here. The resulting model, although slightly less accurate in identification, has a much smaller size than the heavier model. Moreover, ensemble learning was proposed to recover the dropped accuracy. We have tested the proposed approach on CISC datasets including dynamic and static features, and the results show that the proposed method is not only able to lighten the model up to 99%, but also maintain the accuracy of the lightened model to the extent of the heavy model.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 63

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
اطلاعات دوره: 
  • سال: 

    2023
  • دوره: 

    15
  • شماره: 

    1
  • صفحات: 

    59-71
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    18
  • دانلود: 

    0
چکیده: 

Sensitive methods are those that are commonly used by Android Malware to perform malicious behavior. These methods may be either evasion or malicious payload methods. Although there are several approaches to handle these methods for performing effective dynamic Malware analysis, but generally most of them are based on a manually created list. However, the performance shown by the selected approaches is dependent on completeness of the manually created list that is not almost a complete and up-to-date one. Missing some sensitive methods causes to degrade the overall performance and affects the effectiveness of analyzing Android Malware.In this paper, we propose a machine learning approach to predict new sensitive methods that might be used in Android Malware. We use a manually collected training dataset to train two classifiers: a classifier for detecting the sensitivity nature of the Android methods, and another classifier to categorize the detected sensitive methods into predefined categories. We applied the proposed approach to a large number of methods extracted from Android API 27. The proposed approach is able to predict hundreds of sensitive methods with accuracy of 90.5% for the first classifier and 87.4% for the second classifier. To evaluate the proposed approach, we built a new list of the detected sensitive methods and used it in a number of tools to perform dynamic Malware analysis. The proposed model found various sensitive methods that were not considered before by any other tools. Hence, the effectiveness of these tools in performing dynamic analysis are increased.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 18

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button