2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS) 2015
DOI: 10.1109/apnoms.2015.7275426
|View full text |Cite
|
Sign up to set email alerts
|

Android malware detection using multivariate time-series technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…As noted in [41], due to the nature of network traffic and their distributions, (auto-)regressive models struggle to accurately capture them. Kim et al [30] use a multi-variate time-series regression model on host-based resource consumption, such as CPU and memory usage (not network traffic) to identify Android malware. Conti et al [17] propose a method to detect the action performed by Android applications using raw sequential features.…”
Section: Challenges In Malware Behavior Modelingmentioning
confidence: 99%
“…As noted in [41], due to the nature of network traffic and their distributions, (auto-)regressive models struggle to accurately capture them. Kim et al [30] use a multi-variate time-series regression model on host-based resource consumption, such as CPU and memory usage (not network traffic) to identify Android malware. Conti et al [17] propose a method to detect the action performed by Android applications using raw sequential features.…”
Section: Challenges In Malware Behavior Modelingmentioning
confidence: 99%
“…However, to the best of our knowledge, very few multivariate-based malware detection proposals are deployed in the literature at present. So far, as a single example of this, we can cite [47], which is poor from the perspective of the actual capabilities argued for multivariate methodologies.…”
Section: Related Workmentioning
confidence: 99%
“…It deploys suitable monitors on Android systems to log traces and features that are used to look for malicious behaviours. Examples of these are [21], which keeps track of the network traffic or [24], which collects information about the usage of network usage, memory and CPU.…”
Section: Related Workmentioning
confidence: 99%