2016
DOI: 10.1002/sec.1555
|View full text |Cite
|
Sign up to set email alerts
|

Generative versus discriminative classifiers for android anomaly-based detection system using system calls filtering and abstraction process

Abstract: Anomaly‐based detection techniques have been widely studied in recent years. Most of these efforts have focused to improve the accuracy of these techniques. The poor accuracy performance is caused by two factors: (i) the data used for the analysis is insufficient and/or unrepresentative of the application behavior, or (ii) inappropriate algorithms are used to model the behavior of the application. In this paper, we attempt to improve anomaly‐based detection techniques by examining these two factors. First, we … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 36 publications
0
7
0
Order By: Relevance
“…"Means" refers to the average distance between the center of each cluster and the data. As a result, the K-means algorithm was used less [47,56,68,81,97,98,111,139].…”
Section: Algorithms Of Unsupervised Learningmentioning
confidence: 99%
See 2 more Smart Citations
“…"Means" refers to the average distance between the center of each cluster and the data. As a result, the K-means algorithm was used less [47,56,68,81,97,98,111,139].…”
Section: Algorithms Of Unsupervised Learningmentioning
confidence: 99%
“…While we were not able to find any study that utilized unsupervised learning that focused on server and network attacks, we were able to identify the studies that focused on the client software [56,81,185,202] and client hardware [139,200]. Amara et al [81] improved abnormal-based detection technology by examining two factors that caused low accuracy in detection technology.…”
Section: Rq3 What Are the Limitations Of The Current Research?mentioning
confidence: 99%
See 1 more Smart Citation
“…In Amamra et al (2016) , a malware detection mechanism using tracking behavioral system call traces was proposed. Malicious activities were predicted by examining the frequency of behavioral system calls with a previously trained classifier.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Amamra et al presented a detection framework using system calls having the possibility to be implemented in the resource‐constrained environment. To address this issue, they proposed filtering and abstraction process on 200 popular applications.…”
Section: Related Workmentioning
confidence: 99%