2021
DOI: 10.1016/j.jisa.2020.102735
|View full text |Cite
|
Sign up to set email alerts
|

Android botnet detection using machine learning models based on a comprehensive static analysis approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 13 publications
0
3
0
1
Order By: Relevance
“…Malware datasets used Smmarwar et al [167] CICInvesAndMal2019 Arif et al [168] AndroZoo, Drebin Manzanares et al [169] Drebin, AMD, VirusTotal, VirusShare Bhat et al [170] Virustotal, VirusShare, Drebin Elayan et al [171] CICAndMal2017 Syrris et al [172] Drebin Idrees et al [173] Contagiodump, Genome, Virus Total, theZoo, MalShare, VirusShare Rehman et al [174] M0DROID Martin et al [175] Koodous, AndroZoo Navarro et al [176] AndroZoo, [217] , VirusShare, AndroMalShare Milosevic et al [177] M0Droid Alzaylaee et al [178] McAfee Cai et al [179] AMD, Drebin Badhani et al [180] Andro-DumpSys, AndroZoo, Contagio , AndroMalShare , AMD, VirusTotal Hijawi et al [181] [218] Sheen et al [182] Genome Nisha et al [183] AndroZoo, VirusShare, Andro-MalShare, PRAGuard[226] Song et al [184] Not mentioned Zhang et al [185] Genome Yang et al [186] No malware Thiyagarajan et al [187] AndroZoo Qaisar et al [188] Android PRAGuard, Drebin, Open-source apps, Kharon, Androzoo, CICAAGM Appice et al [189] Alternative Chinese and Russian Markets, Android websites, malware forums, security blogs, Genome Zhu et al [190] VirusShare A. Altaher [191] Genome Su et al [192] Drebin, Genome, Contagio Mahindru et al [193] Genome , AndroMalShare, [218] Dehkordy et al [194] Drebin, AMD Nguyen et al [195] AMD, Drebin Taheri et al [196] Drebin, Contagio, Genome Mahesh et al [197] Private companies Firdaus et al [198] Drebin, Genome Shrivastava et al [199] Third-party applications Varsha et al [20...…”
Section: Related Workmentioning
confidence: 99%
“…Malware datasets used Smmarwar et al [167] CICInvesAndMal2019 Arif et al [168] AndroZoo, Drebin Manzanares et al [169] Drebin, AMD, VirusTotal, VirusShare Bhat et al [170] Virustotal, VirusShare, Drebin Elayan et al [171] CICAndMal2017 Syrris et al [172] Drebin Idrees et al [173] Contagiodump, Genome, Virus Total, theZoo, MalShare, VirusShare Rehman et al [174] M0DROID Martin et al [175] Koodous, AndroZoo Navarro et al [176] AndroZoo, [217] , VirusShare, AndroMalShare Milosevic et al [177] M0Droid Alzaylaee et al [178] McAfee Cai et al [179] AMD, Drebin Badhani et al [180] Andro-DumpSys, AndroZoo, Contagio , AndroMalShare , AMD, VirusTotal Hijawi et al [181] [218] Sheen et al [182] Genome Nisha et al [183] AndroZoo, VirusShare, Andro-MalShare, PRAGuard[226] Song et al [184] Not mentioned Zhang et al [185] Genome Yang et al [186] No malware Thiyagarajan et al [187] AndroZoo Qaisar et al [188] Android PRAGuard, Drebin, Open-source apps, Kharon, Androzoo, CICAAGM Appice et al [189] Alternative Chinese and Russian Markets, Android websites, malware forums, security blogs, Genome Zhu et al [190] VirusShare A. Altaher [191] Genome Su et al [192] Drebin, Genome, Contagio Mahindru et al [193] Genome , AndroMalShare, [218] Dehkordy et al [194] Drebin, AMD Nguyen et al [195] AMD, Drebin Taheri et al [196] Drebin, Contagio, Genome Mahesh et al [197] Private companies Firdaus et al [198] Drebin, Genome Shrivastava et al [199] Third-party applications Varsha et al [20...…”
Section: Related Workmentioning
confidence: 99%
“…In this study, we review the tricks designed to evade spam filters, normally based on machine learning algorithms, such as poisoning text, obfuscated words or hidden text salting. For this reason, we only include these spammer strategies without considering a final user perspective, such as cyber-attacks using backscatter spam (Hijawi et al 2021(Hijawi et al , 2017. We refer to social engineering as a set of techniques to seek to steal personal or sensitive confidential information from users using fake online companies, providers or people.…”
Section: Spammer Tricksmentioning
confidence: 99%
“…Chen et al [21] converted app opcodes to an image-like structure in order to perform data augmentation through a Generative Adversarial Network (GAN), while the works by Mahindru et al focused on assessing effective feature selection, mainly considering the usage of APIs and permissions as features [44,45]. Moreover, different works in the literature target specific types of attacks, such as botnets [33] or ransomware samples [17,47,57].…”
Section: Android Malware Detectionmentioning
confidence: 99%