2022 IEEE Symposium on Computers and Communications (ISCC) 2022
DOI: 10.1109/iscc55528.2022.9912986
|View full text |Cite
|
Sign up to set email alerts
|

A Comparison of Machine and Deep Learning Models for Detection and Classification of Android Malware Traffic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…II-C). (DNNs) [12,13], different types of AutoEncoders (AEs) [1,[33][34][35][36], one-and two-dimensional Convolutional Neural Networks (1D-and 2D-CNNs) [1,11,14,26,29,30,32,35,[37][38][39][40][41][42][43], variants of Recurrent Neural Networks (RNNs) such as Long Short-Term Memory (LSTM) [1,29,34,39,44,45] and Gated Recurrent Unit (GRU) [11,30,38,45,46], possibly exploiting the composition capabilities of hybrid DL architectures [1,30,44]. The way input data are fed to such architectures is paramount for taking full advantage of the DL paradigm.…”
Section: Background and Related Workmentioning
confidence: 99%
“…II-C). (DNNs) [12,13], different types of AutoEncoders (AEs) [1,[33][34][35][36], one-and two-dimensional Convolutional Neural Networks (1D-and 2D-CNNs) [1,11,14,26,29,30,32,35,[37][38][39][40][41][42][43], variants of Recurrent Neural Networks (RNNs) such as Long Short-Term Memory (LSTM) [1,29,34,39,44,45] and Gated Recurrent Unit (GRU) [11,30,38,45,46], possibly exploiting the composition capabilities of hybrid DL architectures [1,30,44]. The way input data are fed to such architectures is paramount for taking full advantage of the DL paradigm.…”
Section: Background and Related Workmentioning
confidence: 99%
“…A comparison of traditional ML and DL models for the detection and classification of Android malware traffic is presented by Bovenzi et al (2022). The paper suggests that DL-based techniques can improve the effectiveness of Android malware detection and classification.…”
Section: Introductionmentioning
confidence: 99%
“…Over 1.5 million IoT devices were affected, and the malware targeted numerous famous internet services such as Gmail, Amazon, and others. A cybersecurity developer team in Moscow acquired 121,600 IoT malware samples in 2019, roughly triple the 35,618 samples it acquired in 2018, and over 130,000 variant IoT malware samples whose attacking tactics were smartly evolved were recommended security on these devices [ 5 ].…”
Section: Introductionmentioning
confidence: 99%