{"title":"基于容错算法的多重攻击防御","authors":"M. Grace, M. Sughasiny","doi":"10.1109/ICMNWC52512.2021.9688377","DOIUrl":null,"url":null,"abstract":"Smart devices are prone to numerous attacks these days. Many number of malwares attacks with many ways. Increasing attacks with many attacking ways evades standard prediction methods. The most dangerous attacks among them is colluding attacks. This collusion method make prediction more complex. Data privacy and system integrity will be fragile. Information leakage will be high through this collusion attacks. The android malware detection methods use static, dynamic and hybrid method. From Code control flow graphs patterns will be extracted through this method. both the direct and indirect communication channels will be tracked by these methods.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Defending Multiple Attack Via Multiple Algorithms With Fault Tolerance\",\"authors\":\"M. Grace, M. Sughasiny\",\"doi\":\"10.1109/ICMNWC52512.2021.9688377\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Smart devices are prone to numerous attacks these days. Many number of malwares attacks with many ways. Increasing attacks with many attacking ways evades standard prediction methods. The most dangerous attacks among them is colluding attacks. This collusion method make prediction more complex. Data privacy and system integrity will be fragile. Information leakage will be high through this collusion attacks. The android malware detection methods use static, dynamic and hybrid method. From Code control flow graphs patterns will be extracted through this method. both the direct and indirect communication channels will be tracked by these methods.\",\"PeriodicalId\":186283,\"journal\":{\"name\":\"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICMNWC52512.2021.9688377\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMNWC52512.2021.9688377","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Defending Multiple Attack Via Multiple Algorithms With Fault Tolerance
Smart devices are prone to numerous attacks these days. Many number of malwares attacks with many ways. Increasing attacks with many attacking ways evades standard prediction methods. The most dangerous attacks among them is colluding attacks. This collusion method make prediction more complex. Data privacy and system integrity will be fragile. Information leakage will be high through this collusion attacks. The android malware detection methods use static, dynamic and hybrid method. From Code control flow graphs patterns will be extracted through this method. both the direct and indirect communication channels will be tracked by these methods.