T. Teoh, G. Chiew, Y. Jaddoo, H. Michael, A. Karunakaran, Y. Goh
{"title":"应用RNN和J48深度学习在Android网络安全空间进行威胁分析","authors":"T. Teoh, G. Chiew, Y. Jaddoo, H. Michael, A. Karunakaran, Y. Goh","doi":"10.1109/ICSCEE.2018.8538405","DOIUrl":null,"url":null,"abstract":"Recurrent Neural Networks (RNN) are a special class of deep learning algorithms using neurons or nodes, and have received much attention in the subject of data science in the recent years. In RNN, the input nodes take into consideration not only the current inputs, but the previously perceived outputs as well – hence the term recursive. In today’s context, smartphones are very much a part of almost every individual’s daily lives. The demand, development and usage of Android devices is massive. As Android devices dominate the current market share, the question of security naturally arises in our complex world. Consequently, the amount of malware data available for research is voluminous as well. This publication demonstrates the power and efficiency of RNN applied onto Android malware data. We study a procured dataset, with over 4000 entries labeled as malicious or benign. From our experiment and data analytics, we present a prediction accuracy of 0.964 using RNN.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Applying RNN and J48 Deep Learning in Android Cyber Security Space for Threat Analysis\",\"authors\":\"T. Teoh, G. Chiew, Y. Jaddoo, H. Michael, A. Karunakaran, Y. Goh\",\"doi\":\"10.1109/ICSCEE.2018.8538405\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recurrent Neural Networks (RNN) are a special class of deep learning algorithms using neurons or nodes, and have received much attention in the subject of data science in the recent years. In RNN, the input nodes take into consideration not only the current inputs, but the previously perceived outputs as well – hence the term recursive. In today’s context, smartphones are very much a part of almost every individual’s daily lives. The demand, development and usage of Android devices is massive. As Android devices dominate the current market share, the question of security naturally arises in our complex world. Consequently, the amount of malware data available for research is voluminous as well. This publication demonstrates the power and efficiency of RNN applied onto Android malware data. We study a procured dataset, with over 4000 entries labeled as malicious or benign. From our experiment and data analytics, we present a prediction accuracy of 0.964 using RNN.\",\"PeriodicalId\":265737,\"journal\":{\"name\":\"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSCEE.2018.8538405\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSCEE.2018.8538405","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Applying RNN and J48 Deep Learning in Android Cyber Security Space for Threat Analysis
Recurrent Neural Networks (RNN) are a special class of deep learning algorithms using neurons or nodes, and have received much attention in the subject of data science in the recent years. In RNN, the input nodes take into consideration not only the current inputs, but the previously perceived outputs as well – hence the term recursive. In today’s context, smartphones are very much a part of almost every individual’s daily lives. The demand, development and usage of Android devices is massive. As Android devices dominate the current market share, the question of security naturally arises in our complex world. Consequently, the amount of malware data available for research is voluminous as well. This publication demonstrates the power and efficiency of RNN applied onto Android malware data. We study a procured dataset, with over 4000 entries labeled as malicious or benign. From our experiment and data analytics, we present a prediction accuracy of 0.964 using RNN.