An efficient combined deep neural network based malware detection framework in 5G environment

نویسندگان

چکیده

While Android smartphones are widely used in 5G networks, third-party application platforms facing a rapid increase the screening of applications for market launch. However, on one hand, due to receipt excessive listing, review requires lot time and computing resources. On other multi-selectivity features, it is difficult determine best feature combination as criterion distinguishing benign malicious software. To address these challenges, this paper proposes an efficient malware detection framework based deep neural network called DLAMD that can face large-scale samples. An designed, which combines pre-detection phase detection. The package (APK) analyzed detail, permissions opcodes distinguish from quickly extracted APK. Besides, obtain subset attributes most, random forest with good effect selected importance selection convolutional (CNN) automatically hidden pattern inside features selection. In experiment, real data shared collection download verify high efficiency proposed method. results show comprehensive classification index F1-score reach 95.69%.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

AntiMalDroid: An Efficient SVM-Based Malware Detection Framework for Android

Mobile handsets, especially smartphones, are becoming more open and general-purpose, thus they also become attack targets of malware. Threat of malicious software has become an important factor in the safety of smartphones. Android is the most popular open-source smartphone operating system and its permission declaration access control mechanisms can’t detect the behavior of malware. In this wo...

متن کامل

An efficient method for cloud detection based on the feature-level fusion of Landsat-8 OLI spectral bands in deep convolutional neural network

Cloud segmentation is a critical pre-processing step for any multi-spectral satellite image application. In particular, disaster-related applications e.g., flood monitoring or rapid damage mapping, which are highly time and data-critical, require methods that produce accurate cloud masks in a short time while being able to adapt to large variations in the target domain (induced by atmospheric c...

متن کامل

Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism

Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...

متن کامل

Android Malware Detection Using Backpropagation Neural Network

The rapid growing adoption of android operating system around the world affects the growth of malware that attacks this platform. One possible solution to overcome the threat of malware is building a comprehensive system to detect existing malware. This paper proposes multilayer perceptron artificial neural network trained with backpropagation algorithm to determine an application is malware or...

متن کامل

STRUCTURAL DAMAGE DETECTION BY MODEL UPDATING METHOD BASED ON CASCADE FEED-FORWARD NEURAL NETWORK AS AN EFFICIENT APPROXIMATION MECHANISM

Vibration based techniques of structural damage detection using model updating method, are computationally expensive for large-scale structures. In this study, after locating precisely the eventual damage of a structure using modal strain energy based index (MSEBI), To efficiently reduce the computational cost of model updating during the optimization process of damage severity detection, the M...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer Networks

سال: 2021

ISSN: ['1872-7069', '1389-1286']

DOI: https://doi.org/10.1016/j.comnet.2021.107932