2016 IEEE/WIC/ACM International Conference on Web Intelligence Workshops (WIW) 2016
DOI: 10.1109/wiw.2016.040
|View full text |Cite
|
Sign up to set email alerts
|

Deep4MalDroid: A Deep Learning Framework for Android Malware Detection Based on Linux Kernel System Call Graphs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
89
0
2

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 181 publications
(92 citation statements)
references
References 16 publications
0
89
0
2
Order By: Relevance
“…( Yuan et al, 2016 ) in all other metrics, while utilizing more samples for the experiments. DL-Droid also outperforms Maldozer ( Karbab et al, 2017 ), Deep4MalDroid ( Hou et al, 2016 ), AutoDroid ( Hou et al, 2017 ) and the CNN approach presented in ( McLaughlin et al, 2017 ). It is interesting to note that, just like in Deep4MalDroid and Auto-Droid, the number of the optimum hidden layers for DL-Droid is three.…”
Section: Comparison Of the Performance Of The Deep Learning Classifiementioning
confidence: 89%
“…( Yuan et al, 2016 ) in all other metrics, while utilizing more samples for the experiments. DL-Droid also outperforms Maldozer ( Karbab et al, 2017 ), Deep4MalDroid ( Hou et al, 2016 ), AutoDroid ( Hou et al, 2017 ) and the CNN approach presented in ( McLaughlin et al, 2017 ). It is interesting to note that, just like in Deep4MalDroid and Auto-Droid, the number of the optimum hidden layers for DL-Droid is three.…”
Section: Comparison Of the Performance Of The Deep Learning Classifiementioning
confidence: 89%
“…The work by Hou et al [3] outlines their commercial Android malware detection framework, Deep4MalDroid. Their method involves the use of stacked auto-encoders with best accuracy resulting from 3 layers.…”
Section: Existing Workmentioning
confidence: 99%
“…This is an advanced subset of machine learning, which can overcome some of the limitations of shallow learning. Thus far, initial deep learning research has demonstrated that its superior layer-wise feature learning can better or at least match the performance of shallow learning techniques [3]. It is capable of facilitating a deeper analysis of network data and faster identification of any anomalies.…”
Section: Introductionmentioning
confidence: 99%
“…Finally, the constructed vectors were used to train a multilayered neural network which has been used in applications classification. In [116], a dynamic analysis framework has been developed to detect the apps' malicious behaviour. The proposed method is based on a deep learning architecture with Stacked AutoEncoders (SAEs) in order to classify android apps as malicious or benign.…”
Section: Clustering Algorithms This Type Of Algorithms Ismentioning
confidence: 99%
“…The proposed tool has been tested by building a decision model based on a variety of machine learning algorithms and the obtained results have been compared with the results of some other tools. In [116], a dynamic analysis tool named Component Traversal has been proposed in order to automatically execute the code of each given Android application as completely as possible. It has been stated that the proposed Component Traversal tool outperform the MonkeyRunner tool in term of system calls extraction.…”
Section: User Interface Triggering Toolsmentioning
confidence: 99%