Skip navigation


Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/3406
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMankar, Jyoti R-
dc.contributor.authorGiri, Akash-
dc.contributor.authorGaneshkar, Dhiraj-
dc.contributor.authorjohari, Vishakha-
dc.date.accessioned2022-08-18T10:11:52Z-
dc.date.available2022-08-18T10:11:52Z-
dc.date.issued2022-04-04-
dc.identifier.urihttp://192.168.3.232:8080/jspui/handle/123456789/3406-
dc.description.abstractBotnets have been a serious threat to the Internet security. With the constant sophistication and the resilience of them, a new trend has emerged, shifting botnets from the traditional desktop to the android environment. As in the desktop domain, detecting android botnets is essential to minimize the threat that they impose. Along the diverse set of strategies applied to detect these botnets, the ones that show the best and most generalized results involve discovering patterns in their anomalous behavior. In the android botnet field, one way to detect these patterns is by analyzing the operation parameters of this kind of applications. In this paper, we present an anomaly-based and host-based approach to detect android botnets. The proposed approach uses machine learning algorithms to identify anomalous behaviors in statistical features extracted from system calls.We were able to test the performance of our approach in a close-to-reality scenario. The proposed approach achieved great results, including low false positive rates and high true detection rates.en_US
dc.titleANDROID BOTNET DETECTION USING MACHINE LEARNINGen_US
Appears in Collections:Computer

Files in This Item:
File Description SizeFormat 
PID 28.pdf1.04 MBUnknownView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.