Εμφάνιση απλής εγγραφής

Multiple layer hybrid classification for Android malware detection

dc.contributor.advisorΞενάκης, Χρήστος
dc.contributor.advisorXenakis, Christos
dc.contributor.authorΑνυφαντάκης, Κωνσταντίνος
dc.contributor.authorAnyfantakis, Konstantinos
dc.date.accessioned2022-01-14T07:38:38Z
dc.date.available2022-01-14T07:38:38Z
dc.date.issued2021-06
dc.identifier.urihttps://dione.lib.unipi.gr/xmlui/handle/unipi/14045
dc.identifier.urihttp://dx.doi.org/10.26267/unipi_dione/1468
dc.format.extent85el
dc.language.isoenel
dc.publisherΠανεπιστήμιο Πειραιώςel
dc.rightsΑναφορά Δημιουργού - Παρόμοια Διανομή 3.0 Ελλάδα*
dc.rights.urihttp://creativecommons.org/licenses/by-sa/3.0/gr/*
dc.titleMultiple layer hybrid classification for Android malware detectionel
dc.title.alternativeΥβριδική ταξινόμηση πολλαπλών επιπέδων για ανίχνευση κακόβουλου λογισμικού Androidel
dc.typeMaster Thesisel
dc.contributor.departmentΣχολή Τεχνολογιών Πληροφορικής και Επικοινωνιών. Τμήμα Ψηφιακών Συστημάτωνel
dc.description.abstractENBecause of the ever-increasing number of mobile devices running the Android operating system, as well as their widespread use and diverse application capabilities, such devices have become lucrative targets for malicious apps. Despite mitigating attempts, mobile malware has begun to flourish at an alarming rate. Because Android is an open platform that is fast dominating other rival systems in the mobile smart device industry, this has become much more prominent. Experts acquire significant insights into the mechanics of malware using powerful static and dynamic analysis, and machine learning is frequently used to discover unknown harmful software. Nevertheless, the Android operating system, as well as malware associated with it, is always changing. As a result, training a machine learning model with obsolete malware may have a detrimental impact on the predicted detection of more recent malware, so one of the side goals of this thesis is introducing the Omnidroid dataset and the usage of AndroPyTool. Apart from that, a new wave of Android malware groups has recently developed that have excellent evasive capabilities, making them far harder to identify using traditional approaches. Various malware detection approaches based on static, dynamic, and hybrid analysis have recently been proposed to make Android devices increasingly safe, however with the growing evolution of malware these methods are nowadays ineffective and imprecise. This thesis not only demonstrates how to employ unique parallel classifiers forming stacked ensemble models to identify zero-day Android malware, but it also discusses how this type of models helps improving malware detection using it on both types of features (static features obtained from static analysis and dynamic from dynamic analysis). On top of that, the suggested approach attempts to fuse the results from these two types, being classified on their own, to aggregate attributes from parallel classifiers using as an example a soft-voting ensemble. The final prediction accuracy on the given dataset was found to be around 91%.el
dc.contributor.masterΑσφάλεια Ψηφιακών Συστημάτωνel
dc.subject.keywordAndroidel
dc.subject.keywordMalwareel
dc.subject.keywordDetectionel
dc.subject.keywordEnsembleel
dc.subject.keywordParallelel
dc.subject.keywordMachine learningel
dc.date.defense2021-11-30


Αρχεία σε αυτό το τεκμήριο

Thumbnail

Αυτό το τεκμήριο εμφανίζεται στις ακόλουθες συλλογές

Εμφάνιση απλής εγγραφής

Αναφορά Δημιουργού - Παρόμοια Διανομή 3.0 Ελλάδα
Εκτός από όπου διευκρινίζεται διαφορετικά, το τεκμήριο διανέμεται με την ακόλουθη άδεια:
Αναφορά Δημιουργού - Παρόμοια Διανομή 3.0 Ελλάδα

Βιβλιοθήκη Πανεπιστημίου Πειραιώς
Επικοινωνήστε μαζί μας
Στείλτε μας τα σχόλιά σας
Created by ELiDOC
Η δημιουργία κι ο εμπλουτισμός του Ιδρυματικού Αποθετηρίου "Διώνη", έγιναν στο πλαίσιο του Έργου «Υπηρεσία Ιδρυματικού Αποθετηρίου και Ψηφιακής Βιβλιοθήκης» της πράξης «Ψηφιακές υπηρεσίες ανοιχτής πρόσβασης της βιβλιοθήκης του Πανεπιστημίου Πειραιώς»