Machine Learning in Anomaly Detection: Example of Colluded Applications Attack in Android Devices.
Igor KhokhlovMichael PerezLeon ReznikPublished in: ICMLA (2019)
Keyphrases
- anomaly detection
- machine learning
- network anomaly detection
- mobile devices
- malware detection
- network intrusion
- smart phones
- intrusion detection
- normal behavior
- network intrusion detection
- misuse detection
- detecting anomalies
- mobile applications
- anomalous behavior
- normal traffic
- unsupervised learning
- network traffic
- behavior analysis
- unsupervised anomaly detection
- mobile apps
- detecting anomalous
- data analysis
- feature selection
- data mining
- one class support vector machines
- network security
- pattern recognition
- detect anomalies
- intrusion detection system
- self organizing maps
- active learning
- ddos attacks
- learning algorithm
- reinforcement learning
- connectionist systems
- negative selection algorithm
- text mining
- supervised learning