Mobile botnets detection using deep learning techniques
Journal Title: Electronic and Cyber Defense - Year 2023, Vol 11, Issue 2
Abstract
Smartphones are now well integrated with advanced capabilities and technologies such as the Internet. Today, due to the facilities and capabilities and the widespread use of smart mobile devices, mobile security has become a vital issue worldwide. Smartphones are not properly protected compared to computers and computer networks, and users do not consider security updates. Recently, mobile devices and networks have been targeted by one of the most dangerous cyber threats known as botnets. Mobile Bantent An enhanced example of Boutons has the ability to perform malicious operations such as denial of service attacks, data theft, eavesdropping, and more. Bunters use three communication protocols: HTTP, SMS and Bluetooth to communicate with each other; So when users are not connected to the Internet, botnets are able to communicate with each other. In this study, to identify mobile batonet from 14 Android baton families, including 1932 samples of Android mobile devices applications and 4304 samples of safe and secure Android mobile devices applications have been used. Application permissions were extracted for reverse engineering to automatically classify and detect types of botnets, then based on these permissions, each application was converted to an equivalent image using the proposed method. Labeled images were then used to train convolutional neural networks. The results of evaluation and comparison of this method with classical methods including backup vector machine and decision tree showed that the proposed method is able to achieve higher efficiency in detecting different types of botnets and separating it from healthy programs
Authors and Affiliations
Maryam Ghanavati Nasab, Mahdieh Ghazvini, Fahimeh Ghasemian
Identify malicious traffic on IoT infrastructure using neural networks and deep learning
The Internet of Things is a network of physical devices and equipment that includes sensors, software, and other technologies for exchanging data with other devices and systems over the Internet. The spread of the Intern...
Recognition Chaff from target by determining the optimal waveform in the radar detector using artificial neural network
Deflecting missile’s radar guidance or missile’s seeker by chaff is a common and effective defensive method which is used in military vessels. To counter this defensive measure, methods for recognition targets from chaff...
A Greedy Algorithm for Constructing Region-Fault Tolerant Geometric Spanners
In this paper, we consider the problem of constructing the region-fault tolerant geometric spanners when the problem is restricted to a subclass of convex regions. Let S be a set of n points in the plane. In particular,...
Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density
Satellite communication is considered a significant part of the enemy's communication information in electronic warfare due to its unique features and widespread use in communication systems. Therefore, from the electron...
Distributed Solving of Weapon Target Assignment Problem using Learning Automata
This article presents a method to solve the weapon target assignment problem, which is one of the problems of distributed constraint optimization. The previous methods do not guarantee the convergence problem properly an...