Proceedings of the Third ACM Conference on Wireless Network Security 2010
DOI: 10.1145/1741866.1741874
|View full text |Cite
|
Sign up to set email alerts
|

pBMDS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 90 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…Since signaturebased malware detection systems are based on known malwares, they cannot detect unknown malwares or variants of known malwares. Anomaly-based or behaviour-based systems [21], [8], [13], [20], [26], [23] monitor application or system behaviour in order to identify anomalous activities which may arise due to malware attacks. In general, they identify anomalous activities by deploying machine learning classication algorithms such as SVM, HMM, Naive Bayes, KNN, etc.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Since signaturebased malware detection systems are based on known malwares, they cannot detect unknown malwares or variants of known malwares. Anomaly-based or behaviour-based systems [21], [8], [13], [20], [26], [23] monitor application or system behaviour in order to identify anomalous activities which may arise due to malware attacks. In general, they identify anomalous activities by deploying machine learning classication algorithms such as SVM, HMM, Naive Bayes, KNN, etc.…”
Section: Related Workmentioning
confidence: 99%
“…Researchers have proposed techniques to detect smartphone intrusions using various approaches, which broadly include signature and anomaly-based techniques such as [1,5,6,8,12,13,20,21,23,26,27]. However, the majority of these state-of-the-art techniques emphasise detection accuracy, while neglecting eciency in terms of resource consumption, which manifests as performance overhead on the device (from here on we will use the terms device and smartphone interchangeably) resources and timeliness/detection latency, which is the time between arrival of an intrusion and its detection.…”
Section: Introductionmentioning
confidence: 99%
“…Some of the approaches involve cloud based techniques to detect attack to reduce resource usage at the cost of cloud services, network connectivity and communication to maintain real-time synchronization of device in cloud [5,6]. Other approaches involve non-human, behavioral analysis instead of relying on known signatures for malware detection, are lightweight and run on the device itself but fail to detect instantaneous and abrupt attack [7,8,9]. Even rigorous surveys done from 2011 to 2015 in the area of Smartphone security challenges, talked about android security architecture and its issues, malware evolution and penetration threats and highlight desirable security features, security mechanisms and solutions available and provided suggestions for defense, detection, protection and security [10,11,12,13].…”
Section: Literature Reviewmentioning
confidence: 99%
“…[15] present Taintdroid, a system-wide information flow tracking tool, to provide real-time analysis and identify the privacy leakage problem. Xie et al [16] propose a malware detection system which adopts a probabilistic approach through correlating user inputs with system calls to detect anomalous activities in mobile phones. Crowdroid [17] aim at detecting malware in the Android platform by applying clustering algorithms on system call statistics.…”
Section: Related Workmentioning
confidence: 99%