Cloud of Word vs DroidKungfu: Performance evaluation in detecting root exploit malware with deep learning approach
Android mobile malware is a type of malware that execute malicious activities (stealing and collecting data and running programs without the user's knowledge) in victims' Android mobile device. There are several types of malware, for instance; 1) Root exploit; 2) Botnet; 3) Trojan; and 4)...
| Main Authors: | Che Akmal, Che Yahaya, Ahmad Firdaus, Zainal Abidin, Azlee, Zabidi, Noor Akma, Abu Bakar, Mukrimah, Nawir, Philima Normelissa Ani, Abdul Malek |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English English |
| Published: |
IEEE
2023
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/42254/ http://umpir.ump.edu.my/id/eprint/42254/2/Paper-Akmal-2023-Cloud_of_Word_vs_DroidKungfu.pdf http://umpir.ump.edu.my/id/eprint/42254/8/Cloud%20of%20Word%20vs%20DroidKungfu%20-%20Performance%20evaluation%20in%20detecting%20root%20exploit%20malware%20with%20deep%20learning%20approach.pdf |
Similar Items
A dynamic malware detection in cloud platform
by: Lee, Nani Yer Fui
Published: (2019)
by: Lee, Nani Yer Fui
Published: (2019)
Malware analysis performance enhancement using cloud computing
by: Barakat, Osamah Lutf Hamood, et al.
Published: (2014)
by: Barakat, Osamah Lutf Hamood, et al.
Published: (2014)
Malware detection system using cloud sandbox, machine learning
by: Mail, Mohd Azuwan Efendy, et al.
Published: (2022)
by: Mail, Mohd Azuwan Efendy, et al.
Published: (2022)
Design of cloud-enabled cross-platform malware analysis systems
by: Najafabadi, Seyed Abdolrahman Mousavian
Published: (2016)
by: Najafabadi, Seyed Abdolrahman Mousavian
Published: (2016)
Enhanced cuckoo malware analysis performance using cloud computing
by: Barakat, Osamah Lutf Hamood
Published: (2013)
by: Barakat, Osamah Lutf Hamood
Published: (2013)
Complexity analysis of Quranic chapters for word cloud generation
by: Taib, Ibrahim Adham, et al.
Published: (2019)
by: Taib, Ibrahim Adham, et al.
Published: (2019)
Malware Analysis with Multiple Features
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
Applying Bayesian probability for Android malware detection using permission features
by: Sharfah Ratibah, Tuan Mat, et al.
Published: (2021)
by: Sharfah Ratibah, Tuan Mat, et al.
Published: (2021)
Challenges in high accuracy of malware detection
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
The Rise of “malware”: Bibliometric Analysis of Malware Study
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
Investigation of bypassing malware defences and malware detections
by: Daryabar, Farid, et al.
Published: (2011)
by: Daryabar, Farid, et al.
Published: (2011)
CAGDEEP : Mobile malware analysis using force atlas 2 with strong gravity call graph and deep learning
by: Nur Khairani, Kamarudin, et al.
Published: (2023)
by: Nur Khairani, Kamarudin, et al.
Published: (2023)
Ensemble based categorization and adaptive model for malware detection
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2011)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2011)
Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA)
by: Nur Khairani, Kamarudin, et al.
Published: (2023)
by: Nur Khairani, Kamarudin, et al.
Published: (2023)
Malware visualizer: A web apps malware family classification with machine learning
by: Mohd Zamri, Osman, et al.
Published: (2021)
by: Mohd Zamri, Osman, et al.
Published: (2021)
Techniques for analysing android malware
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
Malware mobile devices in Indonesia
by: Drajad, Wiryawan, et al.
Published: (2019)
by: Drajad, Wiryawan, et al.
Published: (2019)
Automated feature selection using boruta algorithm to detect mobile malware
by: Che Akmal, Che Yahaya, et al.
Published: (2020)
by: Che Akmal, Che Yahaya, et al.
Published: (2020)
Understanding the root of attack in android malware
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Malware classification based on target location
by: Nasuha, Noor Baha
Published: (2014)
by: Nasuha, Noor Baha
Published: (2014)
Machine Learning Malware Detection For Android
by: Amir Muhammad Hafiz, Othman
Published: (2022)
by: Amir Muhammad Hafiz, Othman
Published: (2022)
Understanding the root of attack in android malware
by: Romli, Rahiwan Nazar, et al.
Published: (2018)
by: Romli, Rahiwan Nazar, et al.
Published: (2018)
The trend of mobile malwares and effective detection techniques
by: Abdul Aziz, Normaziah, et al.
Published: (2015)
by: Abdul Aziz, Normaziah, et al.
Published: (2015)
Malware detection through machine learning techniques
by: Amer, Ahmed, et al.
Published: (2019)
by: Amer, Ahmed, et al.
Published: (2019)
Maldroid- attribute selection analysis for malware classification
by: Rahiwan Nazar, Romli, et al.
Published: (2019)
by: Rahiwan Nazar, Romli, et al.
Published: (2019)
Malware Detection In Android Using Machine Learning
by: Muhammad Hazriq Akmal, Zairol
Published: (2023)
by: Muhammad Hazriq Akmal, Zairol
Published: (2023)
Review of hybrid analysis technique for malware detection
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2020)
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2020)
A framework for malware identification based on behavior
by: Mohamad Fadli, Zolkipli
Published: (2012)
by: Mohamad Fadli, Zolkipli
Published: (2012)
Bio-inspired for Features Optimization and Malware Detection
by: Mohd Faizal, Ab Razak, et al.
Published: (2018)
by: Mohd Faizal, Ab Razak, et al.
Published: (2018)
Android: S-Based Technique in Mobile Malware Detection
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Analysis of known and unknown malware bypassing techniques
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
A survey on malware propagation, analysis, and detection
by: Damshenas, Mohsen, et al.
Published: (2013)
by: Damshenas, Mohsen, et al.
Published: (2013)
SCARECROW: scalable malware reporting, detection and analysis
by: Barakat, Osamah Lutf Hamood, et al.
Published: (2013)
by: Barakat, Osamah Lutf Hamood, et al.
Published: (2013)
Nonnegative matrix factorization and metamorphic malware detection
by: Ling, Yeong Tyng, et al.
Published: (2019)
by: Ling, Yeong Tyng, et al.
Published: (2019)
Android malware detection with ensemble of androidmanifest features
by: Mohammad Salehi, .
Published: (2019)
by: Mohammad Salehi, .
Published: (2019)
Permission extraction framework for android malware detection
by: Ghasempour, Ali
Published: (2019)
by: Ghasempour, Ali
Published: (2019)
Dawn Of The Mobile Malware: Reviewing Mobile Worms .
by: Sarwar, Usman, et al.
Published: (2007)
by: Sarwar, Usman, et al.
Published: (2007)
A New Malware Attack Pattern Generalization
by: Yusof, R., et al.
Published: (2011)
by: Yusof, R., et al.
Published: (2011)
Making Copyright Content Available in the Cloud vs the Making of Copies: Revisiting Optus TV and Aereo
by: Foong, Cheryl
Published: (2015)
by: Foong, Cheryl
Published: (2015)
Sequential process of Mel Frequency Cepstrum Coefficient (MFCC) and Binary Particle Swarm Optimization (BPSO) technique for improving the performance of Multi-Layer Perceptron (MLP) to detect asphyxia diseases through infant cries / Azlee Zabidi
by: Zabidi, Azlee
Published: (2012)
by: Zabidi, Azlee
Published: (2012)
Similar Items
-
A dynamic malware detection in cloud platform
by: Lee, Nani Yer Fui
Published: (2019) -
Malware analysis performance enhancement using cloud computing
by: Barakat, Osamah Lutf Hamood, et al.
Published: (2014) -
Malware detection system using cloud sandbox, machine learning
by: Mail, Mohd Azuwan Efendy, et al.
Published: (2022) -
Design of cloud-enabled cross-platform malware analysis systems
by: Najafabadi, Seyed Abdolrahman Mousavian
Published: (2016) -
Enhanced cuckoo malware analysis performance using cloud computing
by: Barakat, Osamah Lutf Hamood
Published: (2013)