LSTM Android Malicious Behavior Analysis Based on Feature Weighting

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Malicious Behavior Monitoring for Android Applications

Android, as a modern popular open source mobile platform, makes its security issues more prominent, especially in user privacy leakage. In this paper, we proposed a twostep model which combines static and dynamic analysis approaches. During the static analysis, permission combination matrix is used to determine whether an application has potential risks. For those suspicious applications, based...

متن کامل

Efficient Malicious URL based on Feature Classification

Deceitful and malicious web sites pretense significant danger to desktop security, integrity and privacy. Malicious web pages that use drive-by download attacks or social engineering techniques to install unwanted software on a user‘s computer have become the main opportunity for the proliferation of malicious code. Detection of malicious URL has become difficult because of the phishing campaig...

متن کامل

Overlap-based feature weighting: The feature extraction of Hyperspectral remote sensing imagery

Hyperspectral sensors provide a large number of spectral bands. This massive and complex data structure of hyperspectral images presents a challenge to traditional data processing techniques. Therefore, reducing the dimensionality of hyperspectral images without losing important information is a very important issue for the remote sensing community. We propose to use overlap-based feature weigh...

متن کامل

Dynamic Analysis System for Detecting Remote Server-Side Polymorphic Malicious Mobile Apps on Android based Smartphone

As Android malware is evolving quickly, malware creators are starting to develop new kinds of threats such as remote server-side polymorphic malicious code for Android platform that are being actively generated and distributed via the official Android Markets. Remote server-side polymorphic mobile apps can’t be detected correctly as those apps contain spyware and trojans as a hidden undetectabl...

متن کامل

Representation Learning for Answer Selection with LSTM-Based Importance Weighting

We present an approach to non-factoid answer selection with a separate component based on BiLSTM to determine the importance of segments in the input. In contrast to other recently proposed attention-based models within the same area, we determine the importance while assuming the independence of questions and candidate answers. Experimental results show the effectiveness of our approach, which...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Ksii Transactions on Internet and Information Systems

سال: 2021

ISSN: ['1976-7277', '2288-1468']

DOI: https://doi.org/10.3837/tiis.2021.06.014