Are Your Training Datasets Yet Relevant? - An Investigation into the Importance of Timeline in Machine Learning-Based Malware Detection

作者: Kevin Allix , Tegawendé F. Bissyandé , Jacques Klein , Yves Le Traon

DOI: 10.1007/978-3-319-15618-7_5

关键词: Computer scienceTimelineAndroid applicationAndroid (operating system)Android malwareData miningMachine learningMalwareArtificial intelligence

摘要: … on the performance of a machine learning-based malware detection scheme. Typically, we show that simply picking a random set of known malware to train a malware detector, as it is …

参考文章(38)
Aditya P. Mathur, Nwokedi Idika, A Survey of Malware Detection Techniques ,(2007)
Boyun Zhang, Jianping Yin, Jingbo Hao, Dingxing Zhang, Shulin Wang, Malicious codes detection based on ensemble learning autonomic and trusted computing. pp. 468- 477 ,(2007) , 10.1007/978-3-540-73547-2_48
William W. Cohen, Fast Effective Rule Induction Machine Learning Proceedings 1995. pp. 115- 123 ,(1995) , 10.1016/B978-1-55860-377-6.50023-2
S. Y. Yerima, S. Sezer, G. McWilliams, I. Muttik, A New Android Malware Detection Approach Using Bayesian Classification advanced information networking and applications. pp. 121- 128 ,(2013) , 10.1109/AINA.2013.88
David Barrera, H. G üne ş Kayacik, Paul C. van Oorschot, Anil Somayaji, A methodology for empirical analysis of permission-based security models and its application to android Proceedings of the 17th ACM conference on Computer and communications security - CCS '10. pp. 73- 84 ,(2010) , 10.1145/1866307.1866317
Axelle Apvrille, Tim Strazzere, Reducing the window of opportunity for Android malware Gotta catch 'em all Journal of Computer Virology and Hacking Techniques. ,vol. 8, pp. 61- 71 ,(2012) , 10.1007/S11416-012-0162-3
Dong-Jie Wu, Ching-Hao Mao, Te-En Wei, Hahn-Ming Lee, Kuo-Ping Wu, DroidMat: Android Malware Detection through Manifest and API Calls Tracing information security. pp. 62- 69 ,(2012) , 10.1109/ASIAJCIS.2012.18
Kevin Allix, Quentin Jerome, Tegawende F. Bissyande, Jacques Klein, Radu State, Yves Le Traon, A Forensic Analysis of Android Malware -- How is Malware Written and How it Could Be Detected? 2014 IEEE 38th Annual Computer Software and Applications Conference. pp. 384- 393 ,(2014) , 10.1109/COMPSAC.2014.61
Heloise Pieterse, Martin S Olivier, Android botnets on the rise: Trends and characteristics information security for south africa. pp. 1- 5 ,(2012) , 10.1109/ISSA.2012.6320432
Hao Peng, Chris Gates, Bhaskar Sarma, Ninghui Li, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian Molloy, Using probabilistic generative models for ranking risks of Android apps Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12. pp. 241- 252 ,(2012) , 10.1145/2382196.2382224