References

ANDROID MALWARE DETECTION BASED ON MACHINE LEARNING ANALYSIS OF TRAFFIC FEATURES


[1] Guojun Peng, Jingwen Li, Runkang Sun and Yunchang Xiao, Android malware detection research and development, J. Wuhan Univ. (Nat. Sci. Ed.) (2015), 21-33.

[2] X. Jiang and Y. Zhou, Dissecting android malware characterization and evolution, IEEE Symposium on Symposium Security & Privacy, IEEE (2012), 95-109.

[3] A. Arora, S. Garg and S. K. Peddoju, Malware detection using network traffic analysis in android based mobile devices, Eighth International Conference on Next Generation Mobile Apps Services and Technologies (2014), 66-71.

[4] X. Jiang and Y. Zhou, A Survey of Android Malware, Springer, New York, (2013), 3-20.

[5] V. Y. Zaburdaev, Gaussian Signals, Correlation Matrices and Sample Path Properties, A First Course in Statistics for Signal Analysis, Birkhäuser, Boston, (2006), 159-174.

[6] Yanping Xu, Chunhua Wu, Meijia Hou, Kangfeng Zheng and Shan Yao, Android malware detection technology based on improved Naïve Bayesian, Journal of Beijing University of Posts and Telecommunications (2016), 43-47.

[7] A. Feizollah, N. B. Anuar, R. Salleh et al., A review on feature selection in mobile malware detection, Digital Investigation the International Journal of Digital Forensics & Incident Response 13(C) (2015), 22-37.

[8] P. Harrington, Machine Learning in Action, Manning Publications Co., 2012.

[9] Hui Wang, Hongyu Chen and Shufen Liu, Intrusion detection system based on improved Naïve Bayesian algorithm, Computer Science 41(4) (2014), 111-115.

[10] Hang Li, Statistical Learning Method, Tsinghua University Press, 2012.

[11] M. Chandramohan and H. B. K. Tan, Detection of mobile malware in the wild, Computer 45(9) (2012), 65-71.

[12] Fangping Wu, Dafang Zhang, Xin Su and Xia-an Bi, Based-on network traffic’s similarity to detect android repackaged application, Journal of Chinese Computer Systems 36(5) (2015), 954-958.

[13] Xiaofei Wang, Research on Android Malicious Application Communication Mechanism and Traffic Feature Extraction Based on HTTP, Hunan University, 2014.

[14] C. Lee and G. G. Lee, Information gain and divergence-based feature selection for machine learning-based text categorization, Information Processing & Management 42(1) (2006), 155-165.

[15] A. G. Karegowda, A. S. Manjunath and M. A. Jayaram, Comparative study of attribute selection using gain ratio and correlation based feature selection, International Journal of Information Technology and Knowledge Management 2(2) (2010), 271-277.

[16] H. Liu and L. Yu, Toward integrating feature selection algorithms for classification and clustering, IEEE Transactions on Knowledge and Data Engineering 17(4) (2005), 491-502.

[17] I. Rish, An empirical study of the Naïve Bayes classifier, IJCAI 2001 workshop on empirical methods in artificial intelligence, IBM, New York, 3(22) (2001), 41-46.

[18] F. Fuentes and D. C. Kar, Ethereal vs. Tcpdump: A comparative study on packet sniffing tools for educational purpose, Journal of Computing Sciences in Colleges 20(4) (2005), 169-176.

[19] V. Jacobson, C. Leres and S. McCanne, The tcpdump manual page, Lawrence Berkeley Laboratory, Berkeley, CA, (1989), 143.

[20] V. Jacobson, C. Leres and S. McCanne, pcap-Packet Capture Library, UNIX Man Page, 2001.

[21] J. Davis and M. Goadrich, The relationship between Precision-Recall and ROC curves, Proceedings of the 23rd International Conference on Machine Learning, ACM (2006), 233-240.

[22] J. Fan, S. Upadhye and A. Worster, Understanding receiver operating characteristic (ROC) curves, CJEM 8(01) (2006), 19-20.

[23] D. J. C. MacKay, Information Theory, Inference and Learning Algorithms, Cambridge University Press, 2003.

[24] VirusShare, Virusshare.com-because sharing is caring, http://virusshare.com/, 2013. Accessed Dec. 10, 2013.

[25] W. Enck, D. Octeau, P. McDaniel et al., A study of android application security, USENIX Security Symposium 2 (2011), 2.