Evaluation of Ensemble Machine Learning Methods in Mobile Threat Detection
Kumar, S., Viinikainen, A., & Hämäläinen, T. (2017). Evaluation of Ensemble Machine Learning Methods in Mobile Threat Detection. In ICITST 2017 : The 12th International Conference for Internet Technology and Secured Transactions (pp. 261-268). Infonomics Society. https://doi.org/10.23919/ICITST.2017.8356396
© 2017 IEEE. Personal use of this material is permitted.
The rapid growing trend of mobile devices continues to soar causing massive increase in cyber security threats. Most pervasive threats include ransom-ware, banking malware, premium SMS fraud. The solitary hackers use tailored techniques to avoid detection by the traditional antivirus. The emerging need is to detect these threats by any flow-based network solution. Therefore, we propose and evaluate a network based model which uses ensemble Machine Learning (ML) methods in order to identify the mobile threats, by analyzing the network flows of the malware communication. The ensemble ML methods not only protect over-fitting of the model but also cope with the issues related to the changing behavior of the attackers. The focus of this study is on android based mobile malwares due to its popularity among users. We have used ensemble methods to combine output of 5 supervised ML algorithms such as RF, PART, JRIP, J.48 and Ridor. Based on the evaluation results, the proposed model was found efficient at detecting known and unknown threats with the accuracy of 98.2%. ...
Parent publication ISBN978-1-908320-93-3
ConferenceInternational Conference for Internet Technology and Secured Transactions
Is part of publicationICITST 2017 : The 12th International Conference for Internet Technology and Secured Transactions
Publication in research information system
MetadataShow full item record
Showing items with similar title or keywords.
Kumar, Sanjay; Viinikainen, Ari; Hämäläinen, Timo (IEEE, 2018)Mobile malware attacks increased three folds in the past few years and continued to expand with the growing number of mobile users. Adversary uses a variety of evasion techniques to avoid detection by traditional systems, ...
Unsupervised network intrusion detection systems for zero-day fast-spreading network attacks and botnets Vahdani Amoli, Payam (University of Jyväskylä, 2015)Today, the occurrence of zero-day and complex attacks in high-speed networks is increasingly common due to the high number vulnerabilities in the cyber world. As a result, intrusions become more sophisticated and fast ...
Lateef, Asim (2016)Wireless Sensor Network can be defined as a network of integrated sensors responsible for environmental sensing, data processing and communication with other sensors and the base station while consuming low power. Today, ...
Penttilä, Jeremias (2017)Menetelmä poikkeavuuksien havaitsemiseen hyperspektrikuvista käyttäen syviä konvolutiivisia autoenkoodereita. Poikkeavuuksien havaitseminen kuvista, erityisesti hyperspektraalisista kuvista, on hankalaa. Kun ongelmaan ...
Vähäkainu, Petri; Lehto, Martti (Academic Conferences International, 2019)Artificial Intelligence (AI) is intelligence exhibited by machines. Any system that perceives its environment and takes actions that maximize its chance of success at some goal may be defined as AI. The family of AI ...