Detection of Cyber Malware Attack Based on Network Traffic Features Using Neural Network
(1) Institut Teknologi Harapan Bangsa
(2) Institut Teknologi Harapan Bangsa
(3) Universitas Ciputra
(*) Corresponding Author
DOI: https://doi.org/10.23917/khif.v6i1.8869
Abstract
Keywords
Full Text:
PDFReferences
Kaspersky, “Mobile Malware Threatens Smartphones & Tablets,” Kaspersky Lab ZA, 2015. [Online]. Available: https://www.kaspersky.co.za/resource-center/threats/mobile-malware. [Accessed: 18-Jul-2018].
C. Lueg, “8,400 new Android malware samples every day,” G Data Security Blog, 2017. [Online]. Available: https://www.gdatasoftware.com/blog/2017/04/29712-8-400-new-android-malware-samples-every-day. [Accessed: 18-Jul-2018].
Y. Zhou and X. Jiang, “Dissecting Android malware: Characterization and Evolution,” in Proceedings - IEEE Symposium on Security and Privacy, 2012, no. 4, pp. 95–109.
B. A. Forouzan, TCP/IP Protocol Suite, 4th ed. New York: McGraw-Hill Companies, Inc., 2010.
A. H. Lashkari, A. F. A. Kadir, H. Gonzalez, K. F. Mbah, and A. A. Ghorbani, “Towards a Network-Based Framework for Android Malware Detection and Characterization,” in Proceeding of the 15th international conference on privacy, security and trust, 2017.
P. Kaushik and A. Jain, “Article: Malware Detection Techniques in Android,” Int. J. Comput. Appl., vol. 122, no. 17, pp. 22–26, 2015.
M. Stevanovic and J. M. Pedersen, “An analysis of network traffic classification for botnet detection,” in 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2015, pp. 1–8.
J. Zhang, Y. Xiang, and Y. Wang, “Network Traffic Classification Using Correlation Information,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 1, pp. 104–117, 2013.
F. Wibowo and A. Harjoko, “Klasifikasi Mutu Pepaya Berdasarkan Ciri Tekstur GLCM Menggunakan Jaringan Saraf Tiruan,” Khazanah Inform. J. Ilmu Komput. dan Inform., vol. 3, no. 2, pp. 100–104, 2018.
T. Rashid, Make Your Own Neural Network: A Gentle Journey Through the Mathematics of Neural Networks. CreateSpace Independent Publishing Platform, 2016.
Canadian Institute for Cybersecurity, “Android Adware and General Malware Dataset,” University of New Brunswick, 2017. [Online]. Available: https://www.unb.ca/cic/datasets/android-adware.html. [Accessed: 18-Nov-2018].
M. Stevanovic and J. M. Pedersen, “An efficient flow-based botnet detection using supervised machine learning,” in 2014 International Conference on Computing, Networking and Communications (ICNC), 2014, pp. 797–801.
H. Lim, Y. Yamaguchi, H. Shimada, and H. Takakura, “Malware Classification Method Based on Sequence of Traffic Flow,” in 2015 International Conference on Information Systems Security and Privacy (ICISSP), 2015, pp. 394–401.
D. Jiang and K. Omote, “An approach to detect remote access trojan in the early stage of communication,” in 2015 IEEE 29th International Conference on Advanced Information Networking and Applications, 2015, pp. 706–713.
Z. B. Celik, R. J. Walls, P. Mcdaniel, and A. Swami, “Malware Traffic Detection using Tamper Resistant Features,” in MILCOM 2015-2015 IEEE Military Communications Conference, 2015, pp. 330–335.
Article Metrics
Abstract view(s): 817 time(s)PDF: 545 time(s)
Refbacks
- There are currently no refbacks.