首页 > 最新文献

International journal of network security & its applications最新文献

英文 中文
MULTI-LAYER CLASSIFIER FOR MINIMIZING FALSE INTRUSION 最小化虚假入侵的多层分类器
Pub Date : 2019-05-31 DOI: 10.5121/IJNSA.2019.11304
Shaker El-Sappagh, El-Sappagh Mohammed, Tarek Ahmed AlSheshtawy
Intrusion detection is one of the standard stages to protect computers in network security framework from several attacks. False alarms problem is critical in intrusion detection, which motivates many researchers to discover methods to minify false alarms. This paper proposes a procedure for classifying the type of intrusion according to multi-operations and multi-layer classifier for handling false alarms in intrusion detection. The proposed system is tested using on KDDcup99 benchmark. The performance showed that results obtained from three consequent classifiers are better than a single classifier. The accuracy reached 98% based on 25 features instead of using all features of KDDCup99 dataset.
入侵检测是保护网络安全框架中的计算机免受各种攻击的标准步骤之一。虚警问题是入侵检测中的一个关键问题,它激发了许多研究者寻找最小化虚警的方法。本文提出了一种基于多操作的入侵类型分类方法和多层分类器处理入侵检测中的虚警。在KDDcup99基准测试上对系统进行了测试。结果表明,三个结果分类器的分类效果优于单个分类器。与使用KDDCup99数据集的所有特征相比,基于25个特征的准确率达到98%。
{"title":"MULTI-LAYER CLASSIFIER FOR MINIMIZING FALSE INTRUSION","authors":"Shaker El-Sappagh, El-Sappagh Mohammed, Tarek Ahmed AlSheshtawy","doi":"10.5121/IJNSA.2019.11304","DOIUrl":"https://doi.org/10.5121/IJNSA.2019.11304","url":null,"abstract":"Intrusion detection is one of the standard stages to protect computers in network security framework from several attacks. False alarms problem is critical in intrusion detection, which motivates many researchers to discover methods to minify false alarms. This paper proposes a procedure for classifying the type of intrusion according to multi-operations and multi-layer classifier for handling false alarms in intrusion detection. The proposed system is tested using on KDDcup99 benchmark. The performance showed that results obtained from three consequent classifiers are better than a single classifier. The accuracy reached 98% based on 25 features instead of using all features of KDDCup99 dataset.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"72 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86296602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY rsa算法改进方法综述
Pub Date : 2019-05-31 DOI: 10.5121/IJNSA.2019.11305
Shaheen Saad Al-Kaabi, S. Belhaouari
Cryptography defines different methods and technologies used in ensuring communication between two parties over any communication medium is secure, especially in presence of a third part. This is achieved through the use of several methods, such as encryption, decryption, signing, generating of pseudo-random numbers, among many others. Cryptography uses a key, or some sort of a password to either encrypt or decrypt a message that needs to be kept secret. This is made possible using two classes of key-based encryption and decryption algorithms, namely symmetric and asymmetric algorithms. The best known and the most widely used public key system is RSA. This algorithm comprises of three phases, which are the key generation phase, encryption phase, and the decryption phase. Owing to the advancement in computing technology, RSA is prone to some security risks, which makes it less secure. The following paper preview different proposals on different methods used to enhance the RSA algorithm and increase its security. Some of these enhancements include combining the RSA algorithm with Diffie-Hellman or ElGamal algorithm, modification of RSA to include three or four prime numbers, offline storage of generated keys, a secured algorithm for RSA where the message can be encrypted using dual encryption keys, etc.
密码学定义了不同的方法和技术,用于确保双方在任何通信媒介上的通信是安全的,特别是在第三方存在的情况下。这是通过使用几种方法实现的,例如加密、解密、签名、生成伪随机数等。密码学使用密钥或某种密码来加密或解密需要保密的消息。这可以使用两类基于密钥的加密和解密算法,即对称和非对称算法。最著名和最广泛使用的公钥系统是RSA。该算法包括三个阶段,即密钥生成阶段、加密阶段和解密阶段。由于计算技术的进步,RSA容易存在一些安全风险,这使得它的安全性降低。下面的文章预览了用于增强RSA算法并提高其安全性的不同方法的不同建议。其中一些增强包括将RSA算法与Diffie-Hellman或ElGamal算法相结合,修改RSA以包含三个或四个素数,离线存储生成的密钥,RSA的安全算法,其中消息可以使用双加密密钥加密,等等。
{"title":"METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY","authors":"Shaheen Saad Al-Kaabi, S. Belhaouari","doi":"10.5121/IJNSA.2019.11305","DOIUrl":"https://doi.org/10.5121/IJNSA.2019.11305","url":null,"abstract":"Cryptography defines different methods and technologies used in ensuring communication between two parties over any communication medium is secure, especially in presence of a third part. This is achieved through the use of several methods, such as encryption, decryption, signing, generating of pseudo-random numbers, among many others. Cryptography uses a key, or some sort of a password to either encrypt or decrypt a message that needs to be kept secret. This is made possible using two classes of key-based encryption and decryption algorithms, namely symmetric and asymmetric algorithms. The best known and the most widely used public key system is RSA. This algorithm comprises of three phases, which are the key generation phase, encryption phase, and the decryption phase. Owing to the advancement in computing technology, RSA is prone to some security risks, which makes it less secure. The following paper preview different proposals on different methods used to enhance the RSA algorithm and increase its security. Some of these enhancements include combining the RSA algorithm with Diffie-Hellman or ElGamal algorithm, modification of RSA to include three or four prime numbers, offline storage of generated keys, a secured algorithm for RSA where the message can be encrypted using dual encryption keys, etc.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"52 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90550074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Review of Selected Proposals for Improving Identity Privacy in UMTS 改进UMTS中身份隐私的若干建议综述
Pub Date : 2019-03-31 DOI: 10.5121/IJNSA.2019.11203
Hiten Choudhury
Universal Mobile Telecommunication System (UMTS) is a popular 3G standard for mobile telecommunication networks. ‘Vulnerability of the subscriber’s identity privacy and the need to eliminate this vulnerability’, is an established security issue in UMTS. This vulnerability continues to exist up to various extents in the descendent networks of UMTS, like LTE. Several solutions suggesting improvements to the identity privacy in UMTS is present in the literature. In this paper, we look into select few of these solutions, with the expectation that researcher envisioning to work in this area will get a direction in devising an efficient mechanism in improving identity privacy in UMTS, its descendants and future mobile networks.
通用移动通信系统(UMTS)是一种流行的移动通信网络3G标准。“用户身份隐私的漏洞和消除这一漏洞的必要性”是UMTS中一个既定的安全问题。该漏洞在UMTS的后代网络(如LTE)中继续以不同程度存在。文献中提出了几种建议改进UMTS身份隐私的解决方案。在本文中,我们研究了这些解决方案中的一些,期望研究人员设想在这一领域工作,将在设计一种有效的机制来改善UMTS、其后代和未来移动网络的身份隐私方面获得方向。
{"title":"A Review of Selected Proposals for Improving Identity Privacy in UMTS","authors":"Hiten Choudhury","doi":"10.5121/IJNSA.2019.11203","DOIUrl":"https://doi.org/10.5121/IJNSA.2019.11203","url":null,"abstract":"Universal Mobile Telecommunication System (UMTS) is a popular 3G standard for mobile telecommunication networks. ‘Vulnerability of the subscriber’s identity privacy and the need to eliminate this vulnerability’, is an established security issue in UMTS. This vulnerability continues to exist up to various extents in the descendent networks of UMTS, like LTE. Several solutions suggesting improvements to the identity privacy in UMTS is present in the literature. In this paper, we look into select few of these solutions, with the expectation that researcher envisioning to work in this area will get a direction in devising an efficient mechanism in improving identity privacy in UMTS, its descendants and future mobile networks.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87893004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security & Privacy Threats, Attacks and Countermeasures in Internet of Things 物联网中的安全与隐私威胁、攻击与对策
Pub Date : 2019-03-31 DOI: 10.5121/IJNSA.2019.11205
F. Masoodi, Shadab Alam, Shams Tabrez Siddiqui
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn significant attention during the past few years, the pace at which new devices are being integrated into the system will profoundly impact the world in a good way but also poses some severe queries about security and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most significant concerns of IoT is to provide security assurance for the data exchange because data is vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where each layer provides a service. The security needs vary from layer to layer as each layer serves a different purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks have been discussed along with some existing and proposed countermeasures
在任何时间点将所有东西连接到任何东西的想法模糊地定义了物联网(IoT)的概念。物联网不仅仅是提供连接,而且还促进这些连接的事物之间的交互。尽管物联网这个术语在1999年就被引入,但在过去的几年里引起了极大的关注,新设备被集成到系统中的速度将以一种好的方式深刻影响世界,但也提出了一些关于安全和隐私的严重问题。目前形式的物联网很容易受到多种攻击。物联网最重要的问题之一是为数据交换提供安全保障,因为数据容易受到物联网每层攻击者的攻击。物联网具有分层结构,每一层提供一项服务。安全需求因层而异,因为每一层的目的不同。本文旨在分析与物联网相关的各种安全和隐私威胁。讨论了一些攻击以及一些现有的和拟议的对策
{"title":"Security & Privacy Threats, Attacks and Countermeasures in Internet of Things","authors":"F. Masoodi, Shadab Alam, Shams Tabrez Siddiqui","doi":"10.5121/IJNSA.2019.11205","DOIUrl":"https://doi.org/10.5121/IJNSA.2019.11205","url":null,"abstract":"The idea to connect everything to anything and at any point of time is what vaguely defines the concept of the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn significant attention during the past few years, the pace at which new devices are being integrated into the system will profoundly impact the world in a good way but also poses some severe queries about security and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most significant concerns of IoT is to provide security assurance for the data exchange because data is vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where each layer provides a service. The security needs vary from layer to layer as each layer serves a different purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks have been discussed along with some existing and proposed countermeasures","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"61 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86636345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Dual Security Using Image Steganography Based Matrix Partition 基于矩阵分割的图像隐写双重安全
Pub Date : 2019-03-31 DOI: 10.5121/IJNSA.2019.11202
Huda H.Al.ghuraify, Ali A.Al-bakry, Ahmad T. Al-jayashi
Recently, the mode of living became more complicated without computer systems. The techniques of camouflage information have acquired a vital role with the requirement of intensifying trade of multimedia content. Steganography is the technique that utilizes disguise in a way that prohibits unauthorized access from suspicion of the existence of confidential information exchanged during communication channels between the connected parties. In this paper, an integrated image steganographic system is designed to conceal images, messages or together where the mainly deliberate the improvement of embedding capacity through embedding text with image simultaneously. For that purpose, used matrix partition to partition the secret image then embedded each partition separately after scrambling each pixel by replacing msb instead of lsb to provide the second level of security furthermore to steganography. The simulation results clarify the better performance of the proposed algorithms.
最近,没有计算机系统的生活方式变得更加复杂。随着多媒体内容交易的日益激烈,伪装信息技术发挥着至关重要的作用。隐写术是一种利用伪装的技术,以防止未经授权的访问被怀疑存在在连接方之间的通信通道中交换的机密信息。本文设计了一种集成的图像隐写系统,实现了图像、信息或同时隐藏,主要考虑的是通过文本与图像同时嵌入来提高嵌入能力。为此,使用矩阵分割对秘密图像进行分割,然后用msb代替lsb对每个像素进行置乱后,将每个分割单独嵌入,为隐写提供进一步的第二级安全性。仿真结果表明,该算法具有较好的性能。
{"title":"Dual Security Using Image Steganography Based Matrix Partition","authors":"Huda H.Al.ghuraify, Ali A.Al-bakry, Ahmad T. Al-jayashi","doi":"10.5121/IJNSA.2019.11202","DOIUrl":"https://doi.org/10.5121/IJNSA.2019.11202","url":null,"abstract":"Recently, the mode of living became more complicated without computer systems. The techniques of camouflage information have acquired a vital role with the requirement of intensifying trade of multimedia content. Steganography is the technique that utilizes disguise in a way that prohibits unauthorized access from suspicion of the existence of confidential information exchanged during communication channels between the connected parties. In this paper, an integrated image steganographic system is designed to conceal images, messages or together where the mainly deliberate the improvement of embedding capacity through embedding text with image simultaneously. For that purpose, used matrix partition to partition the secret image then embedded each partition separately after scrambling each pixel by replacing msb instead of lsb to provide the second level of security furthermore to steganography. The simulation results clarify the better performance of the proposed algorithms.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"30 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90830969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
KVEFS: Encrypted File System Based on Distributed Key-Value Stores and FUSE KVEFS:基于分布式键值存储和FUSE的加密文件系统
Pub Date : 2019-03-31 DOI: 10.5121/IJNSA.2019.11204
Giau Ho Kim, Son Hai Le, Trung Manh Nguyen, Vu Thi Ly, T. N. Kim, Nguyen Van Cuong, T. N. Trung, Ta Minh Thanh
File System is an important component of a secure operating system. The need to build data protection systems is extremely important in open source operating systems, high mobility hardware systems, and miniaturization of storage devices that make systems available. It is clear that the value of the data is much larger than the value of the storage device. Computers access protection mechanism does not work if the thief retrieves the hard drive from the computer and reads data from it on another computer. Encrypted File System (EFS) is a secure level of operating system kernel. EFS uses cryptography to encrypt or decrypt files and folders when they are being saved or retrieved from a hard disk. EFS is often integrated transparently in operating system There are many encrypted filesystems commonly used in Linux operating systems. However, they have some limitations, which are the inability to hide the structure of the file system. This is a shortcoming targeted by the attacker, who will try to decrypt a file to find the key and then decrypt the entire file system. In this paper, we propose a new architecture of EFS called KVEFS which is based on cryptographic algorithms, FUSE library and key-value store. Our method makes EFS portable and flexible; Kernel size will not increase in Operating System.
文件系统是安全操作系统的重要组成部分。在开源操作系统、高移动性硬件系统和使系统可用的存储设备小型化中,构建数据保护系统的需求极其重要。很明显,数据的价值远远大于存储设备的价值。如果窃贼从计算机中取出硬盘驱动器并在另一台计算机上读取数据,则计算机访问保护机制不起作用。加密文件系统(EFS)是操作系统内核的一个安全级别。EFS使用加密技术对保存或从硬盘检索的文件和文件夹进行加密或解密。EFS通常透明地集成在操作系统中。Linux操作系统中通常使用许多加密文件系统。但是,它们有一些限制,即无法隐藏文件系统的结构。这是攻击者针对的一个缺点,他们将尝试解密文件以找到密钥,然后解密整个文件系统。本文提出了一种新的基于加密算法、FUSE库和键值存储的EFS体系结构KVEFS。该方法使EFS具有便携性和灵活性;内核大小不会在操作系统中增加。
{"title":"KVEFS: Encrypted File System Based on Distributed Key-Value Stores and FUSE","authors":"Giau Ho Kim, Son Hai Le, Trung Manh Nguyen, Vu Thi Ly, T. N. Kim, Nguyen Van Cuong, T. N. Trung, Ta Minh Thanh","doi":"10.5121/IJNSA.2019.11204","DOIUrl":"https://doi.org/10.5121/IJNSA.2019.11204","url":null,"abstract":"File System is an important component of a secure operating system. The need to build data protection systems is extremely important in open source operating systems, high mobility hardware systems, and miniaturization of storage devices that make systems available. It is clear that the value of the data is much larger than the value of the storage device. Computers access protection mechanism does not work if the thief retrieves the hard drive from the computer and reads data from it on another computer. Encrypted File System (EFS) is a secure level of operating system kernel. EFS uses cryptography to encrypt or decrypt files and folders when they are being saved or retrieved from a hard disk. EFS is often integrated transparently in operating system There are many encrypted filesystems commonly used in Linux operating systems. However, they have some limitations, which are the inability to hide the structure of the file system. This is a shortcoming targeted by the attacker, who will try to decrypt a file to find the key and then decrypt the entire file system. In this paper, we propose a new architecture of EFS called KVEFS which is based on cryptographic algorithms, FUSE library and key-value store. Our method makes EFS portable and flexible; Kernel size will not increase in Operating System.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"160 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73798717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How to secure your supply chain 如何保障您的供应链
Pub Date : 2019-03-01 DOI: 10.1016/S1353-4858(19)30038-8
Rory Duncan
{"title":"How to secure your supply chain","authors":"Rory Duncan","doi":"10.1016/S1353-4858(19)30038-8","DOIUrl":"https://doi.org/10.1016/S1353-4858(19)30038-8","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"98 1","pages":"18-19"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85764585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Is reputational damage worse than a regulator's fine? 声誉受损比监管机构的罚款更严重吗?
Pub Date : 2019-03-01 DOI: 10.1016/S1353-4858(19)30035-2
Jessica Canada
{"title":"Is reputational damage worse than a regulator's fine?","authors":"Jessica Canada","doi":"10.1016/S1353-4858(19)30035-2","DOIUrl":"https://doi.org/10.1016/S1353-4858(19)30035-2","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"26 1","pages":"11-12"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84001797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Micro-segmentation: securing complex cloud environments 微分割:保护复杂的云环境
Pub Date : 2019-03-01 DOI: 10.1016/S1353-4858(19)30034-0
Dave Klein
{"title":"Micro-segmentation: securing complex cloud environments","authors":"Dave Klein","doi":"10.1016/S1353-4858(19)30034-0","DOIUrl":"https://doi.org/10.1016/S1353-4858(19)30034-0","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"47 1","pages":"6-10"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84897764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Malware Detection Using Machine Learning Algorithms and Reverse Engineering of Android Java Code 基于机器学习算法和Android Java代码逆向工程的恶意软件检测
Pub Date : 2019-01-31 DOI: 10.5121/IJNSA.2019.11101
M. Kedziora, Paulina Gawin, Michał Szczepanik, I. Józwiak
This research paper is focused on the issue of mobile application malware detection by Reverse Engineering of Android java code and use of Machine Learning algorithms. The malicious software characteristics were identified based on a collected set of total number of 1958 applications (including 996 malware applications). During research a unique set of features was chosen, then three attribute selection algorithms and five classification algorithms (Random Forest, K Nearest Neighbors, SVM, Nave Bayes and Logistic Regression) were examined to choose algorithms that would provide the most effective rate of malware detection.
本文的研究重点是通过Android java代码的逆向工程和机器学习算法的使用来检测移动应用程序恶意软件。恶意软件特征是基于收集到的1958个应用程序总数(包括996个恶意软件)进行识别的。在研究过程中,选择了一组独特的特征,然后检查了三种属性选择算法和五种分类算法(随机森林,K近邻,SVM, Nave Bayes和Logistic回归),以选择能够提供最有效的恶意软件检测率的算法。
{"title":"Malware Detection Using Machine Learning Algorithms and Reverse Engineering of Android Java Code","authors":"M. Kedziora, Paulina Gawin, Michał Szczepanik, I. Józwiak","doi":"10.5121/IJNSA.2019.11101","DOIUrl":"https://doi.org/10.5121/IJNSA.2019.11101","url":null,"abstract":"This research paper is focused on the issue of mobile application malware detection by Reverse Engineering of Android java code and use of Machine Learning algorithms. The malicious software characteristics were identified based on a collected set of total number of 1958 applications (including 996 malware applications). During research a unique set of features was chosen, then three attribute selection algorithms and five classification algorithms (Random Forest, K Nearest Neighbors, SVM, Nave Bayes and Logistic Regression) were examined to choose algorithms that would provide the most effective rate of malware detection.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"30 5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79185942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
期刊
International journal of network security & its applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1