High Accuracy Detection of Mobile Malware Using Machine Learning

Edited by
April 2023
226 pages
  • ISBN978-3-0365-7175-1 (Hardback)
  • ISBN978-3-0365-7174-4 (PDF)

This book is a reprint of the Special Issue High Accuracy Detection of Mobile Malware Using Machine Learning that was published in

Computer Science & Mathematics
Physical Sciences

As increasingly sophisticated and evasive malware attacks continue to emerge, more effective detection solutions to tackle the problem are being sought through the application of advanced machine learning techniques. This reprint presents several advances in the field including: a new method of generating adversarial samples through byte sequence feature extraction using deep learning; a state-of-the-art comparative evaluation of deep learning approaches for mobile botnet detection; a novel visualization-based approach that utilizes images for Android botnet detection; a study on the detection of drive-by exploits in images using deep learning; etc. Furthermore, this reprint presents state-of-the-art reviews about machine learning-based detection techniques that will increase researchers' knowledge in the field and enable them to identify future research and development directions.

  • Hardback
© 2022 by the authors; CC BY-NC-ND license
malware analysis and detection; applied machine learning; mobile security; neural network; ensemble classification; botnet detection; deep learning; Android botnets; convolutional neural networks; dense neural networks; recurrent neural networks; long short-term memory; gated recurrent unit; CNN-LSTM; CNN-GRU; Android security; malware detection; code vulnerability; machine learning; malware; machine learning; deep learning; static analysis; dynamic analysis; hybrid analysis; security; malware detection; Monte-Carlo simulation; reinforcement learning; adversarial sample; malware detection; deep learning; convolutional neural network; botnet detection; Histogram of Oriented Gradients; image processing; android botnets; machine learning; digital forensic; optimization; multilayer perceptron; salp swarm algorithm; connection weights; business email compromise (BEC); email phishing; phishing detection; machine learning (ML); systematic literature review; steganography; steganalysis; polyglots; neural networks; deep learning; n/a