A Systematic Overview of the Machine Learning Methods for Mobile Malware Detection
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Yu-kyung | - |
dc.contributor.author | Lee, Jemin Justin | - |
dc.contributor.author | Go, Myong-Hyun | - |
dc.contributor.author | Kang, Hae Young | - |
dc.contributor.author | Lee, Kyungho | - |
dc.date.accessioned | 2022-09-24T06:41:11Z | - |
dc.date.available | 2022-09-24T06:41:11Z | - |
dc.date.created | 2022-09-23 | - |
dc.date.issued | 2022-07-22 | - |
dc.identifier.issn | 1939-0114 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/143853 | - |
dc.description.abstract | With the deployment of the 5G cellular system, the upsurge of diverse mobile applications and devices has increased the potential challenges and threats posed to users. Industry and academia have attempted to address cyber security challenges by implementing automated malware detection and machine learning algorithms. This study expands on previous research on machine learning-based mobile malware detection. We critically evaluate 154 selected articles and highlight their strengths and weaknesses as well as potential improvements. We explore the mobile malware detection techniques used in recent studies based on attack intentions, such as server, network, client software, client hardware, and user. In contrast to other SLR studies, our study classified the means of attack as supervised and unsupervised learning. Therefore, this article aims at providing researchers with in-depth knowledge in the field and identifying potential future research and a framework for a thorough evaluation. Furthermore, we review and summarize security challenges related to cybersecurity that can lead to more effective and practical research. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | WILEY-HINDAWI | - |
dc.subject | FEATURE-SELECTION | - |
dc.subject | CONTEXT-AWARE | - |
dc.subject | ANDROID APPS | - |
dc.subject | CLASSIFICATION | - |
dc.subject | FEATURES | - |
dc.subject | BEHAVIOR | - |
dc.subject | PERMISSIONS | - |
dc.subject | PLATFORM | - |
dc.subject | THREATS | - |
dc.subject | KERNEL | - |
dc.title | A Systematic Overview of the Machine Learning Methods for Mobile Malware Detection | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Kyungho | - |
dc.identifier.doi | 10.1155/2022/8621083 | - |
dc.identifier.scopusid | 2-s2.0-85135484833 | - |
dc.identifier.wosid | 000835053300004 | - |
dc.identifier.bibliographicCitation | SECURITY AND COMMUNICATION NETWORKS, v.2022 | - |
dc.relation.isPartOf | SECURITY AND COMMUNICATION NETWORKS | - |
dc.citation.title | SECURITY AND COMMUNICATION NETWORKS | - |
dc.citation.volume | 2022 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | Y | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | FEATURE-SELECTION | - |
dc.subject.keywordPlus | CONTEXT-AWARE | - |
dc.subject.keywordPlus | ANDROID APPS | - |
dc.subject.keywordPlus | CLASSIFICATION | - |
dc.subject.keywordPlus | FEATURES | - |
dc.subject.keywordPlus | BEHAVIOR | - |
dc.subject.keywordPlus | PERMISSIONS | - |
dc.subject.keywordPlus | PLATFORM | - |
dc.subject.keywordPlus | THREATS | - |
dc.subject.keywordPlus | KERNEL | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.