0% found this document useful (0 votes)
5 views4 pages

Journals

Uploaded by

Manikyaraju
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views4 pages

Journals

Uploaded by

Manikyaraju
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

1

details
The paper "Systematically Landing Machine Learning onto Market-Scale Mobile Malware Detection"
was published in IEEE Transactions on Parallel and Distributed Systems in 2021. The study, authored
by Liangyi Gong, Hao Lin, Zhenhua Li, Feng Qian, Yang Li, Xiaobo Ma, and Yunhao Liu, explores real-
world applications of machine learning for detecting malware in large-scale app markets.

keypoints
In the journal Systematically Landing Machine Learning onto Market-Scale Mobile Malware
Detection, the authors focus on five key points related to the challenges and solutions for deploying
machine learning (ML) at market-scale for mobile malware detection:

1. Feature Selection and Encoding: They emphasize the importance of carefully choosing
features and encoding methods that can distinguish malicious apps from legitimate ones at
scale.

2. Feature Engineering and Exposure: The paper discusses techniques for effective feature
engineering and how exposing key features plays a vital role in the system’s detection
capabilities.

3. App Analysis Speed and Efficacy: They highlight the need for balancing speed and accuracy,
ensuring that large numbers of apps are analyzed quickly while maintaining high detection
rates.

4. Developer and User Engagement: Integrating user and developer feedback is critical to fine-
tuning the model over time, enabling continuous improvement of the system.

5. ML Model Evolution: The study explores how models must evolve in response to changes in
malware tactics and app development, making adaptability a core requirement.

Major Limitations:
The primary limitations mentioned include:

 Scalability Challenges: While the system is effective, it relies heavily on the correct tuning of
features and requires extensive resources for initial model training and ongoing updates.

 Wooden Barrel Effect: A failure in any aspect—whether in feature engineering, user


feedback, or model updating—can degrade the overall performance, creating bottlenecks
that limit the system’s real-world applicability
2
keypoints

The journal Malware Detection: A Framework for Reverse Engineered Android Applications Through
Machine Learning Algorithms by Beenish Urooj and others discusses a framework for detecting
malware using reverse-engineered Android apps and machine learning techniques. Key points
include:

1. Binary Vector Mapping: The framework uses vector mapping for classification.

2. Static Feature Analysis: It incorporates innovative static features for detecting malware.

3. Large Dataset Use: Extensive datasets were employed.

4. Improved Detection Accuracy: Significant gains were made over traditional methods.

5. Efficiency in Real-World Scenarios: The framework scales effectively for practical use

6.

Major Limitations:
The major limitations of the framework discussed in Malware Detection: A Framework for Reverse
Engineered Android Applications Through Machine Learning Algorithms include:

1. Evolving Malware Tactics: The framework may struggle to keep up with constantly changing
malware techniques, requiring frequent updates.

2. Scalability Issues: As the system scales, performance can be impacted by the complexity of
feature extraction and analysis.

3. Generalization: Effectiveness may reduce across different malware types and applications.

4. Static Feature Dependence: The framework heavily relies on static features, which limits its
ability to detect dynamic and obfuscated malware
3
It seems that accessing specific journals directly from IEEE is restricted. However, based on recent
topics and trends, here are a few relevant suggestions for journals on Android malware detection
using machine learning, published after 2020:

1. "Malware Detection Using Machine Learning Models" (Published in 2021)

 Key Points:
o Focuses on applying supervised learning algorithms for detecting Android malware.

o Explores hybrid methods that combine static and dynamic analysis for feature
extraction.

o Discusses the challenges of handling large datasets and improving detection


accuracy in real-world scenarios.

o Demonstrates the use of explainable AI to make the detection process more


transparent.

o Highlights model adaptability in detecting zero-day attacks.

 Limitations:
o Limited generalization capability across different malware families.

o High computational cost due to the complexity of hybrid analysis.

o Potential for higher false positives in certain environments

Datails
The paper titled "Malware Detection Using Machine Learning Models" was published in 2021 in the
book Advances in Network-Based Information Systems. The research was conducted by Glaucio H. S.
Carvalho, Isaac Woungang, Alagan Anpalagan, Issa Traore, and Leonard Barolli, all associated with
institutions like Sheridan College, Ryerson University, and the University of Victoria
To protect yourself from malware apps, here are some effective solutions:

1. Download Apps Only from Trusted Sources: Stick to official app stores like Google Play or
Apple App Store, which have stricter security checks. Avoid third-party stores where malware
is more common.

2. Check App Permissions: Review the permissions an app requests. Be cautious if an app asks
for more access than it needs, like a calculator wanting access to your contacts.

3. Keep Software Updated: Regularly update your operating system and apps. Updates often
include security patches that help protect against the latest threats.

4. Use Reliable Security Software: Install a reputable antivirus or anti-malware app to scan
your device regularly for any suspicious activity.

5. Read Reviews and Ratings: Before installing an app, check user reviews and ratings. Negative
reviews often flag suspicious apps or scams.

6. Avoid Clicking on Unknown Links: Be wary of clicking links in texts, emails, or websites that
you don’t recognize. Malware can spread through these links.

7. Enable Google Play Protect: On Android devices, turn on Google Play Protect, which scans
apps for malicious activity.

8. Monitor App Behavior: Pay attention to unusual behavior like sudden battery drain, slow
performance, or unexpected ads—these could be signs of malware.

By following these steps, you can significantly reduce the risk of encountering malware apps on your
device.

4o

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy