Network-based detection of mobile malware exhibiting obfuscated or silent network behavior.
Lanier A. WatkinsAmritha Lal KalathummarathWilliam H. RobinsonPublished in: CCNC (2018)
Keyphrases
- reverse engineering
- mobile communication
- mobile networks
- network connectivity
- mobile devices
- network structure
- network model
- human behavior
- dynamic analysis
- object detection
- computer networks
- automatic detection
- mobile applications
- neural network
- wireless sensor networks
- detection algorithm
- false positives
- data flow
- detect malicious
- malicious code
- malware detection
- communication patterns
- peer to peer
- wireless technologies
- mobile nodes
- mobile phone
- detection method
- mobile users
- network traffic
- complex networks