2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) 2020
DOI: 10.1109/cybersa49311.2020.9139664
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Botnet Detection: A Deep Learning Approach Using Convolutional Neural Networks

Abstract: Android, being the most widespread mobile operating systems is increasingly becoming a target for malware. Malicious apps designed to turn mobile devices into bots that may form part of a larger botnet have become quite common, thus posing a serious threat. This calls for more effective methods to detect botnets on the Android platform. Hence, in this paper, we present a deep learning approach for Android botnet detection based on Convolutional Neural Networks (CNN). Our proposed botnet detection system is imp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 26 publications
(15 citation statements)
references
References 17 publications
0
15
0
Order By: Relevance
“…They achieved this by observing the code behaviour of known malware binaries that possess command and control features. In [40], an Android botnet detection system based on deep learning was proposed. The system is based on 342 static features including permissions, API calls, extra files, commands and intents.…”
Section: Botnet Detection On Androidmentioning
confidence: 99%
“…They achieved this by observing the code behaviour of known malware binaries that possess command and control features. In [40], an Android botnet detection system based on deep learning was proposed. The system is based on 342 static features including permissions, API calls, extra files, commands and intents.…”
Section: Botnet Detection On Androidmentioning
confidence: 99%
“…Similarly, ref. [7] proposes an Android botnet detection approach based on CNN, where not only permissions were used as features but also API calls, Commands, Intents, and Extra Files. Unlike in ref.…”
Section: Related Workmentioning
confidence: 99%
“…As mentioned earlier, the ISCX Android botnet dataset from [9] was utilized for the experiments in this paper. This dataset contains 1929 botnet apps and has been employed in previous works including [6][7][8][10][11][12][13]22]. Table 3 shows the distribution of samples within the 14 different botnet families present in the dataset.…”
Section: Dataset Used For the Investigationmentioning
confidence: 99%
See 1 more Smart Citation
“…In the context of botnet detection, supervised ML methods are commonly used for the implementation of network traffic classifiers, able to distinguish between benign and malicious traffic by assigning the corresponding label to each log or by identifying traffic belonging to different botnets. A number of techniques have demonstrated good detection results in this line of work, including Support Vector Machines [13], tree-based methods [14], and modern neural network-based architectures [15] [16].…”
Section: Related Workmentioning
confidence: 99%