Linear SVM-Based Android Malware Detection for Reliable IoT Services

被引:63
作者
Ham, Hyo-Sik [1 ]
Kim, Hwan-Hee [1 ]
Kim, Myung-Sup [2 ]
Choi, Mi-Jung [1 ]
机构
[1] Kangwon Natl Univ, Dept Comp Sci, Gangwon Do 200701, South Korea
[2] Korea Univ, Dept Comp & Informat Sci, Sejong Si 339770, South Korea
基金
新加坡国家研究基金会;
关键词
D O I
10.1155/2014/594501
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Current many Internet of Things (IoT) services are monitored and controlled through smartphone applications. By combining IoT with smartphones, many convenient IoT services have been provided to users. However, there are adverse underlying effects in such services including invasion of privacy and information leakage. In most cases, mobile devices have become cluttered with important personal user information as various services and contents are provided through them. Accordingly, attackers are expanding the scope of their attacks beyond the existing PC and Internet environment into mobile devices. In this paper, we apply a linear support vector machine (SVM) to detect Android malware and compare the malware detection performance of SVM with that of other machine learning classifiers. Through experimental validation, we show that the SVM outperforms other machine learning classifiers.
引用
收藏
页数:10
相关论文
共 50 条
[21]   Towards a Reliable Hierarchical Android Malware Detection Through Image-based CNN [J].
Geremias, Jhonatan ;
Viegas, Eduardo K. ;
Santin, Altair O. ;
Britto, Alceu ;
Horchulhack, Pedro .
2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
[22]   A SVM-based Software Homology Detection Method [J].
Sun, Bang ;
Liu, Xiaoming ;
Lei, Dian ;
Li, Qi .
PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON INTELLIGENT CONTROL AND COMPUTER APPLICATION, 2016, 30 :201-204
[23]   SVM-Based Failure Detection of GHT Localizations [J].
Blaffert, T. ;
Lorenz, C. ;
Nickisch, H. ;
Peters, J. ;
Weese, J. .
MEDICAL IMAGING 2016: IMAGE PROCESSING, 2016, 9784
[24]   A Novel SVM-Based Edge Detection Method [J].
Wu Peng ;
Chen Qichao .
INTERNATIONAL CONFERENCE ON APPLIED PHYSICS AND INDUSTRIAL ENGINEERING 2012, PT C, 2012, 24 :2075-2082
[25]   SVM-based Approach for Buried Object Detection [J].
Zhang, Qing He ;
Yao, Jing-Jing .
PIERS 2010 XI'AN: PROGRESS IN ELECTROMAGNETICS RESEARCH SYMPOSIUM PROCEEDINGS, VOLS 1 AND 2, 2010, :1657-+
[26]   An SVM-Based Ensemble Approach for Intrusion Detection [J].
Sahu, Santosh Kumar ;
Katiyar, Akanksha ;
Kumari, Kanchan Mala ;
Kumar, Govind ;
Mohapatra, Durga Prasad .
INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2019, 14 (01) :66-84
[27]   SVM-Based Fall Detection Method for Elderly People Using Android Low-Cost Smartphones [J].
Pierleoni, Paola ;
Pernini, Luca ;
Belli, Alberto ;
Palma, Lorenzo ;
Valenti, Simone ;
Paniccia, Michele .
2015 IEEE SENSORS APPLICATIONS SYMPOSIUM (SAS), 2015, :424-428
[28]   Adversarial android malware detection for mobile multimedia applications in IoT environments [J].
Rahim Taheri ;
Reza Javidan ;
Zahra Pooranian .
Multimedia Tools and Applications, 2021, 80 :16713-16729
[29]   SVM-Based Normal Pressure Hydrocephalus Detection [J].
Rau, Alexander ;
Kim, Suam ;
Yang, Shan ;
Reisert, Marco ;
Kellner, Elias ;
Duman, Ikram Eda ;
Stieltjes, Bram ;
Hohenhaus, Marc ;
Beck, Juergen ;
Urbach, Horst ;
Egger, Karl .
CLINICAL NEURORADIOLOGY, 2021, 31 (04) :1029-1035
[30]   SVM-based network intrusion detection model [J].
Zhang, Kun ;
Cao, Hong-Xin ;
Liu, Feng-Yu ;
Li, Qian-Mu .
Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and Technology, 2007, 31 (04) :403-408