Jakka, 2021 - Google Patents
Extracting Malware Threat Patterns on a Mobile PlatformJakka, 2021
View HTML- Document ID
- 6207277789033294176
- Author
- Jakka G
- Publication year
External Links
Snippet
This study focuses on the rapidly increasing frequency of smartphone malware attacks since2019. Most users have relied on smartphones as they are a rich source of valuable information (for example, in finance, privacy, and other fields). Analytic researchers focus on …
- 238000001514 detection method 0 abstract description 137
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30587—Details of specialised database models
- G06F17/30595—Relational databases
- G06F17/30598—Clustering or classification
- G06F17/30601—Clustering or classification including cluster or class visualization or browsing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6256—Obtaining sets of training patterns; Bootstrap methods, e.g. bagging, boosting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shaukat et al. | A survey on machine learning techniques for cyber security in the last decade | |
Levshun et al. | A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities | |
Jakka | Extracting Malware Threat Patterns on a Mobile Platform | |
Laurenza et al. | Malware triage for early identification of advanced persistent threat activities | |
Kuppa et al. | Finding rats in cats: Detecting stealthy attacks using group anomaly detection | |
Alazab et al. | Detecting malicious behaviour using supervised learning algorithms of the function calls | |
Kumar et al. | Identification of Android malware using refined system calls | |
Waheed et al. | Evolving trees for detecting android malware using evolutionary learning | |
Gurukala et al. | Feature selection using particle swarm optimization and ensemble-based machine learning models for ransomware detection | |
Panja et al. | An efficient malware detection approach based on machine learning feature influence techniques for resource-constrained devices | |
Saied et al. | Review of filtering based feature selection for Botnet detection in the Internet of Things | |
Rahman et al. | An exploratory analysis of feature selection for malware detection with simple machine learning algorithms | |
Mahmood et al. | A Smishing Detection Method Based on SMS Contents Analysis and URL Inspection Using Google Engine and VirusTotal | |
Singla et al. | Privacy Enhancement in Internet of Things (IoT) via mRMR for prevention and avoidance of data leakage | |
Naït-Abdesselam et al. | Malware forensics: Legacy solutions, recent advances, and future challenges | |
Xu et al. | Malicious SMS detection using ensemble learning and SMOTE to improve mobile cybersecurity | |
Negi et al. | A robust approach for malware attacks detection in the internet of things communications | |
Prathapaneni et al. | Dynamic Behaviour analysis and interpretation of Malware in Android devices using Ensemble Machine Learning | |
Stewart et al. | Machine learning for intrusion detection systems: A systematic literature review | |
Shehata et al. | Comparative Study for Andriod Mobile Static Analysis Algorithms | |
Anusha et al. | Investigation on malware detection using deep learning methods for sustainable development | |
Hamdi et al. | A Comprehensive Study of Malware Detection in Android Operating Systems | |
Eke et al. | Malware Detection Based on Stack Ensemble Using Machine Learning | |
Sahan et al. | Malware detection of PDF documents based on machine learning techniques (A review) | |
Chukunda et al. | Malware Detection and Classification System using Random Forest |