applsci-logo

Journal Browser

Journal Browser

Malware Analysis and Detection

A special issue of Applied Sciences (ISSN 2076-3417).

Deadline for manuscript submissions: closed (15 January 2018)

Special Issue Editors


E-Mail Website
Guest Editor
Korea University
Interests: malware analysis; software security; automated vulnerability discovery

E-Mail Website
Guest Editor
Saga University
Interests: network security; security and privacy for networked systems; applied machine learning for security

E-Mail Website
Guest Editor
City University of New York
Interests: network security; systems security and privacy; malware; denial of service; botnets

Special Issue Information

Dear Colleagues,

Malware targets are expanding from conventional computer systems to ever growing IoT devices, which include home appliances to industrial control systems. Malware is being used for earning money by performing click fraud, acting as ransomware, and even collecting crypto currencies as a cryptominer. The recognition of their infection becomes more difficult due to invisible aspects of such embedded devices from users. Now we need to have broader attention to the malware threats as the growth of their infection vectors and significance of their damage to our daily lives. We are soliciting great ideas from various fields in order to combat sophisticated malware. Topics may include, but are not limited to:

  • Automated malware detection and response
  • Machine learning for malware detection
  • Lineage analysis of malware family
  • Botnets, ransomware, cryptominers and others
  • Various types of IoT malware and their defense mechanisms
  • New types of malware and their defenses
  • Mobile and smartphone security
  • Darknet and black market economy analysis

Prof. Heejo Lee
Prof. Yoshiaki Hori
Prof. Sven Dietrich
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Malware analysis
  • IoT security
  • smartphone security
  • security economy

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

20 pages, 977 KiB  
Article
Malware Collusion Attack against SVM: Issues and Countermeasures
by Hongyi Chen, Jinshu Su, Linbo Qiao and Qin Xin
Appl. Sci. 2018, 8(10), 1718; https://doi.org/10.3390/app8101718 - 21 Sep 2018
Cited by 9 | Viewed by 4097
Abstract
Android has become the most popular mobile platform, and a hot target for malware developers. At the same time, researchers have come up with numerous ways to deal with malware. Among them, machine learning based methods are quite effective in Android malware detection, [...] Read more.
Android has become the most popular mobile platform, and a hot target for malware developers. At the same time, researchers have come up with numerous ways to deal with malware. Among them, machine learning based methods are quite effective in Android malware detection, the accuracy of which can be as high as 98%. Thus, malware developers have the incentives to develop more advanced malware to evade detection. This paper presents an adversary attack scenario (Collusion Attack) that will compromise current machine learning based malware detection methods, especially Support Vector Machines (SVM). The malware developers can perform this attack easily by splitting malicious payload into two or more apps. Meanwhile, attackers may hide their malicious behavior by using advanced techniques (Evasion Attack), such as obfuscation, etc. According to our simulation, 87.4% of apps can evade Linear SVM by Collusion Attack. When performing Collusion and Evasion Attack simultaneously, the evasion rate can reach 100% at a low cost. Thus, we proposed a method to deal with this issue. This approach, realized in a tool, called ColluDroid, can identify the collusion apps by analyzing the communication between apps. In addition, it can integrate secure learning methods (e.g., Sec-SVM) to fight against Evasion Attack. The evaluation results show that ColluDroid is effective in finding out the collusion apps and ColluDroid-Sec-SVM has the best performance in the presence of both Collusion and Evasion Attack. Full article
(This article belongs to the Special Issue Malware Analysis and Detection)
Show Figures

Figure 1

Back to TopTop