基于机器学习的Android恶意软件检测SIGPID

Senathipathi K, G. S, Gokul G, Hari Priya M J
{"title":"基于机器学习的Android恶意软件检测SIGPID","authors":"Senathipathi K, G. S, Gokul G, Hari Priya M J","doi":"10.1109/ICOEI51242.2021.9452948","DOIUrl":null,"url":null,"abstract":"Smart phone use has been gradually growing in recent years, as has the number of Android device users. As the number of Android app users grows, malicious Android apps are being developed as a tool to steal sensitive data and commit identity theft / fraud on mobile banks and wallets. There are a plethora of malware identification tools and apps on the market. However, new complex malicious apps generated by intruders or hackers need powerful and efficient malicious application detection tools. To begin, we must collect a dataset of prior malicious apps as a training set, and then compare the training dataset to the trained dataset using the CNN algorithm and the RNN algorithm. Open source datasets, such as Kaggle datasets, were used to build the datasets. We use a pre-processing and attribute extraction technique before running the algorithm. Preprocessing of data that is related to independent variables or data features. It ultimately assists in the normalisation of data within a specified boundary. Standard scalar data is usually distributed within each function, and will scale them to the point where the distribution is zero and the root mean square deviation is one, feature extraction techniques such as the tf-idf transform and data pruning are used. It also aids in the acceleration of algorithmic calculations. Using this algorithm, we can detect threatful Mobile applications.","PeriodicalId":420826,"journal":{"name":"2021 5th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"SIGPID For Machine Learning based Android Malware Detection\",\"authors\":\"Senathipathi K, G. S, Gokul G, Hari Priya M J\",\"doi\":\"10.1109/ICOEI51242.2021.9452948\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Smart phone use has been gradually growing in recent years, as has the number of Android device users. As the number of Android app users grows, malicious Android apps are being developed as a tool to steal sensitive data and commit identity theft / fraud on mobile banks and wallets. There are a plethora of malware identification tools and apps on the market. However, new complex malicious apps generated by intruders or hackers need powerful and efficient malicious application detection tools. To begin, we must collect a dataset of prior malicious apps as a training set, and then compare the training dataset to the trained dataset using the CNN algorithm and the RNN algorithm. Open source datasets, such as Kaggle datasets, were used to build the datasets. We use a pre-processing and attribute extraction technique before running the algorithm. Preprocessing of data that is related to independent variables or data features. It ultimately assists in the normalisation of data within a specified boundary. Standard scalar data is usually distributed within each function, and will scale them to the point where the distribution is zero and the root mean square deviation is one, feature extraction techniques such as the tf-idf transform and data pruning are used. It also aids in the acceleration of algorithmic calculations. Using this algorithm, we can detect threatful Mobile applications.\",\"PeriodicalId\":420826,\"journal\":{\"name\":\"2021 5th International Conference on Trends in Electronics and Informatics (ICOEI)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-06-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 5th International Conference on Trends in Electronics and Informatics (ICOEI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOEI51242.2021.9452948\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 5th International Conference on Trends in Electronics and Informatics (ICOEI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOEI51242.2021.9452948","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

近年来,智能手机的使用逐渐增长,安卓设备的用户数量也在增长。随着Android应用程序用户数量的增长,恶意Android应用程序被开发为窃取敏感数据和对手机银行和钱包进行身份盗窃/欺诈的工具。市场上有大量的恶意软件识别工具和应用程序。然而,入侵者或黑客生成的新的复杂恶意应用需要强大而高效的恶意应用检测工具。首先,我们必须收集之前恶意应用的数据集作为训练集,然后使用CNN算法和RNN算法将训练数据集与训练数据集进行比较。开源数据集,如Kaggle数据集,被用来构建数据集。在运行算法之前,我们使用了预处理和属性提取技术。与自变量或数据特征相关的数据的预处理。它最终有助于在指定边界内对数据进行规范化。标准标量数据通常分布在每个函数中,并将其缩放到分布为零且均方根偏差为1的点,使用tf-idf变换和数据修剪等特征提取技术。它还有助于加速算法计算。利用该算法,我们可以检测出具有威胁的移动应用程序。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
SIGPID For Machine Learning based Android Malware Detection
Smart phone use has been gradually growing in recent years, as has the number of Android device users. As the number of Android app users grows, malicious Android apps are being developed as a tool to steal sensitive data and commit identity theft / fraud on mobile banks and wallets. There are a plethora of malware identification tools and apps on the market. However, new complex malicious apps generated by intruders or hackers need powerful and efficient malicious application detection tools. To begin, we must collect a dataset of prior malicious apps as a training set, and then compare the training dataset to the trained dataset using the CNN algorithm and the RNN algorithm. Open source datasets, such as Kaggle datasets, were used to build the datasets. We use a pre-processing and attribute extraction technique before running the algorithm. Preprocessing of data that is related to independent variables or data features. It ultimately assists in the normalisation of data within a specified boundary. Standard scalar data is usually distributed within each function, and will scale them to the point where the distribution is zero and the root mean square deviation is one, feature extraction techniques such as the tf-idf transform and data pruning are used. It also aids in the acceleration of algorithmic calculations. Using this algorithm, we can detect threatful Mobile applications.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Comparative Analysis of Various Transfer Learning Approaches Skin Cancer Detection Deep Learning Methods for Object Detection in Autonomous Vehicles Load Manage Optimization through Grid and PV Energy Integration System Design of Brain Controlled Robotic Car using Raspberry Pi Feasibility Study of Economic Forecasting Model based on Data Mining
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1