Mobile botnets detection using deep learning techniques
Journal Title: Electronic and Cyber Defense - Year 2023, Vol 11, Issue 2
Abstract
Smartphones are now well integrated with advanced capabilities and technologies such as the Internet. Today, due to the facilities and capabilities and the widespread use of smart mobile devices, mobile security has become a vital issue worldwide. Smartphones are not properly protected compared to computers and computer networks, and users do not consider security updates. Recently, mobile devices and networks have been targeted by one of the most dangerous cyber threats known as botnets. Mobile Bantent An enhanced example of Boutons has the ability to perform malicious operations such as denial of service attacks, data theft, eavesdropping, and more. Bunters use three communication protocols: HTTP, SMS and Bluetooth to communicate with each other; So when users are not connected to the Internet, botnets are able to communicate with each other. In this study, to identify mobile batonet from 14 Android baton families, including 1932 samples of Android mobile devices applications and 4304 samples of safe and secure Android mobile devices applications have been used. Application permissions were extracted for reverse engineering to automatically classify and detect types of botnets, then based on these permissions, each application was converted to an equivalent image using the proposed method. Labeled images were then used to train convolutional neural networks. The results of evaluation and comparison of this method with classical methods including backup vector machine and decision tree showed that the proposed method is able to achieve higher efficiency in detecting different types of botnets and separating it from healthy programs
Authors and Affiliations
Maryam Ghanavati Nasab, Mahdieh Ghazvini, Fahimeh Ghasemian
Motion-encoded Gravitational Search Algorithm for moving target search using UAVs
In this paper, a new algorithm called Motion Coding Gravitational Search Algorithm (MGSA) is proposed to find a moving target using a unmanned aerial vehicles (UAVs). Using the laws of physics and the properties of the e...
Investigating The Effect of Social Engineering Techniques on Employees Vulnerability(Case study: Tehran Municipality Employees)
Social engineering is the art of deceiving people in a way that no use of force and threat, something to do or provide that information to social engineer . Social engineering can follow self-interest or organizational o...
Developing an Improved Method for Malware Attack Detection in Cloud Computing using Ensemble Learning
Nowadays, detecting unusual events in the network has been the subject of many researches. Network traffic is huge and very large, and this leads to high data size and increased noise, which makes it very difficult to ex...
Analysis of exchange market disruptors using graph-based social network analysis
Today, increasing the science and technology and the communication technologies, especially in cyberspace, however physically act have become interact with cyberspace has caused a more significant effect on the culture a...
Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks
Accurate timing is one of the key features of the Global Positioning System (GPS), which is employed in many critical infrastructures. Any imprecise time measurement in GPS-based structures, such as smart power grids, an...