应用RNN和J48深度学习在Android网络安全空间进行威胁分析

T. Teoh, G. Chiew, Y. Jaddoo, H. Michael, A. Karunakaran, Y. Goh
{"title":"应用RNN和J48深度学习在Android网络安全空间进行威胁分析","authors":"T. Teoh, G. Chiew, Y. Jaddoo, H. Michael, A. Karunakaran, Y. Goh","doi":"10.1109/ICSCEE.2018.8538405","DOIUrl":null,"url":null,"abstract":"Recurrent Neural Networks (RNN) are a special class of deep learning algorithms using neurons or nodes, and have received much attention in the subject of data science in the recent years. In RNN, the input nodes take into consideration not only the current inputs, but the previously perceived outputs as well – hence the term recursive. In today’s context, smartphones are very much a part of almost every individual’s daily lives. The demand, development and usage of Android devices is massive. As Android devices dominate the current market share, the question of security naturally arises in our complex world. Consequently, the amount of malware data available for research is voluminous as well. This publication demonstrates the power and efficiency of RNN applied onto Android malware data. We study a procured dataset, with over 4000 entries labeled as malicious or benign. From our experiment and data analytics, we present a prediction accuracy of 0.964 using RNN.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Applying RNN and J48 Deep Learning in Android Cyber Security Space for Threat Analysis\",\"authors\":\"T. Teoh, G. Chiew, Y. Jaddoo, H. Michael, A. Karunakaran, Y. Goh\",\"doi\":\"10.1109/ICSCEE.2018.8538405\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recurrent Neural Networks (RNN) are a special class of deep learning algorithms using neurons or nodes, and have received much attention in the subject of data science in the recent years. In RNN, the input nodes take into consideration not only the current inputs, but the previously perceived outputs as well – hence the term recursive. In today’s context, smartphones are very much a part of almost every individual’s daily lives. The demand, development and usage of Android devices is massive. As Android devices dominate the current market share, the question of security naturally arises in our complex world. Consequently, the amount of malware data available for research is voluminous as well. This publication demonstrates the power and efficiency of RNN applied onto Android malware data. We study a procured dataset, with over 4000 entries labeled as malicious or benign. From our experiment and data analytics, we present a prediction accuracy of 0.964 using RNN.\",\"PeriodicalId\":265737,\"journal\":{\"name\":\"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSCEE.2018.8538405\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSCEE.2018.8538405","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

摘要

递归神经网络(RNN)是一类特殊的使用神经元或节点的深度学习算法,近年来在数据科学领域受到了广泛关注。在RNN中,输入节点不仅考虑当前的输入,还考虑之前感知到的输出——因此称为递归。在今天的背景下,智能手机几乎是每个人日常生活的一部分。Android设备的需求、开发和使用都是巨大的。随着Android设备占据当前的市场份额,安全问题自然会在我们这个复杂的世界中出现。因此,可用于研究的恶意软件数据的数量也是巨大的。本文演示了RNN应用于Android恶意软件数据的能力和效率。我们研究了一个获取的数据集,其中有超过4000个条目被标记为恶意或良性。通过实验和数据分析,我们提出了RNN的预测精度为0.964。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Applying RNN and J48 Deep Learning in Android Cyber Security Space for Threat Analysis
Recurrent Neural Networks (RNN) are a special class of deep learning algorithms using neurons or nodes, and have received much attention in the subject of data science in the recent years. In RNN, the input nodes take into consideration not only the current inputs, but the previously perceived outputs as well – hence the term recursive. In today’s context, smartphones are very much a part of almost every individual’s daily lives. The demand, development and usage of Android devices is massive. As Android devices dominate the current market share, the question of security naturally arises in our complex world. Consequently, the amount of malware data available for research is voluminous as well. This publication demonstrates the power and efficiency of RNN applied onto Android malware data. We study a procured dataset, with over 4000 entries labeled as malicious or benign. From our experiment and data analytics, we present a prediction accuracy of 0.964 using RNN.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信