
Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/3406Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Mankar, Jyoti R | - |
| dc.contributor.author | Giri, Akash | - |
| dc.contributor.author | Ganeshkar, Dhiraj | - |
| dc.contributor.author | johari, Vishakha | - |
| dc.date.accessioned | 2022-08-18T10:11:52Z | - |
| dc.date.available | 2022-08-18T10:11:52Z | - |
| dc.date.issued | 2022-04-04 | - |
| dc.identifier.uri | http://192.168.3.232:8080/jspui/handle/123456789/3406 | - |
| dc.description.abstract | Botnets have been a serious threat to the Internet security. With the constant sophistication and the resilience of them, a new trend has emerged, shifting botnets from the traditional desktop to the android environment. As in the desktop domain, detecting android botnets is essential to minimize the threat that they impose. Along the diverse set of strategies applied to detect these botnets, the ones that show the best and most generalized results involve discovering patterns in their anomalous behavior. In the android botnet field, one way to detect these patterns is by analyzing the operation parameters of this kind of applications. In this paper, we present an anomaly-based and host-based approach to detect android botnets. The proposed approach uses machine learning algorithms to identify anomalous behaviors in statistical features extracted from system calls.We were able to test the performance of our approach in a close-to-reality scenario. The proposed approach achieved great results, including low false positive rates and high true detection rates. | en_US |
| dc.title | ANDROID BOTNET DETECTION USING MACHINE LEARNING | en_US |
| Appears in Collections: | Computer | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| PID 28.pdf | 1.04 MB | Unknown | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.