2019 2nd International Conference on Data Intelligence and Security (ICDIS) 2019
DOI: 10.1109/icdis.2019.00016
|View full text |Cite
|
Sign up to set email alerts
|

Malware Detection Using Power Consumption and Network Traffic Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…In [91], ML classifiers are trained and validated by data acquired from hardware performance counters (HPCs). A side-channel malware detection method that utilizes CPU power consumption data [92] is another example of M-ID1. M-ID2 detects a hidden backdoor.…”
Section: B Malware Defense (Attacks #2-#6)mentioning
confidence: 99%
“…In [91], ML classifiers are trained and validated by data acquired from hardware performance counters (HPCs). A side-channel malware detection method that utilizes CPU power consumption data [92] is another example of M-ID1. M-ID2 detects a hidden backdoor.…”
Section: B Malware Defense (Attacks #2-#6)mentioning
confidence: 99%
“…It was shown that differences in the power consumption profiles of a mobile phone might be used to identify the currently used application [ 3 ]. The performance may be further improved when power consumption profiling is performed together with network traffic data analysis [ 4 ].…”
Section: Introductionmentioning
confidence: 99%
“…Their data was collected from the computer processor power consumption with sample period of five minutes, then various machine learning algorithm were used and tested the method on more than one operating system to ensure that it will have high accuracy. An experiment conducted by Jimenez et al [ 6 ] focused on collecting the power consumption data of the computer processing unit with the network data. They then used ten machine learning techniques to analyze and classify if a computer was infected or not.…”
Section: Introductionmentioning
confidence: 99%