A Glimpse of the Whole: Detecting Few-shot Android Malware Encrypted Network Traffic.
Wenhao LiXiao-Yu ZhangHuaifeng BaoQiang WangHaichao ShiZhaoxuan LiPublished in: HPCC/DSS/SmartCity/DependSys (2022)
Keyphrases
- network traffic
- malware detection
- anomaly detection
- malicious code
- detecting anomalous
- intrusion detection
- detect malicious
- computer networks
- network bandwidth
- network management
- network monitoring
- network security
- detect anomalies
- traffic analysis
- traffic volume
- network intrusion detection
- traffic data
- detection algorithm
- intrusion detection system
- video sequences
- internet traffic
- network traffic data
- video data
- mobile applications
- network resources
- mobile devices
- reverse engineering
- data mining
- feature selection
- traffic patterns
- web caching
- key frames
- peer to peer
- association rules
- machine learning