Intelligent mobile malware detection:
The popularity of Android mobile phones has caused more cybercriminalstocreate malware applications that carry out various malicious activities. The attacks, whichescalatedafter the COVID-19 pandemic, proved there is great importance in protecting Android mobile devices from malware attacks. Intelli...
Gespeichert in:
Beteiligte Personen: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Boca Raton, FL
CRC Press
2023
|
Ausgabe: | First edition. |
Schriftenreihe: | Security, privacy, and trust in mobile communications
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781000824988/?ar |
Zusammenfassung: | The popularity of Android mobile phones has caused more cybercriminalstocreate malware applications that carry out various malicious activities. The attacks, whichescalatedafter the COVID-19 pandemic, proved there is great importance in protecting Android mobile devices from malware attacks. Intelligent Mobile Malware Detection will teach users how to develop intelligent Android malware detection mechanisms by using various graph and stochastic models. The book begins with an introduction to the Android operating system accompanied by the limitations of the state-of-the-art static malware detection mechanisms as well as a detailed presentation of a hybrid malware detection mechanism. The text then presents four different system call-based dynamic Android malware detection mechanisms using graph centrality measures, graph signal processing and graph convolutional networks. Further, the text shows how most of the Android malware can be detected by checking the presence of a unique subsequence of system calls in its system call sequence. All the malware detection mechanisms presented in the book are based on the authors' recent research. The experiments are conducted with the latest Android malware samples, andthe malware samples are collected from public repositories. The source codes are also provided for easy implementation of the mechanisms. This book will be highly useful to Android malware researchers, developers, students and cyber security professionals to explore and build defense mechanisms against the ever-evolving Android malware. |
Beschreibung: | Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on February 07, 2023) |
Umfang: | 1 Online-Ressource |
ISBN: | 9781000824971 1000824977 9781003121510 1003121519 9781000824988 1000824985 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-092806856 | ||
003 | DE-627-1 | ||
005 | 20240228121850.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230530s2023 xx |||||o 00| ||eng c | ||
020 | |a 9781000824971 |c electronic book |9 978-1-000-82497-1 | ||
020 | |a 1000824977 |c electronic book |9 1-000-82497-7 | ||
020 | |a 9781003121510 |c electronic book |9 978-1-003-12151-0 | ||
020 | |a 1003121519 |c electronic book |9 1-003-12151-9 | ||
020 | |a 9781000824988 |c electronic bk. |9 978-1-000-82498-8 | ||
020 | |a 1000824985 |c electronic bk. |9 1-000-82498-5 | ||
035 | |a (DE-627-1)092806856 | ||
035 | |a (DE-599)KEP092806856 | ||
035 | |a (ORHE)9781000824988 | ||
035 | |a (DE-627-1)092806856 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a UT |2 bicssc | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Thomas, Tony |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Intelligent mobile malware detection |c Tony Thomas, Roopak Surendran and Teenu S. John, Mamoun Alazab |
250 | |a First edition. | ||
264 | 1 | |a Boca Raton, FL |b CRC Press |c 2023 | |
264 | 4 | |c ©2023 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Security, privacy, and trust in mobile communications | |
500 | |a Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on February 07, 2023) | ||
520 | |a The popularity of Android mobile phones has caused more cybercriminalstocreate malware applications that carry out various malicious activities. The attacks, whichescalatedafter the COVID-19 pandemic, proved there is great importance in protecting Android mobile devices from malware attacks. Intelligent Mobile Malware Detection will teach users how to develop intelligent Android malware detection mechanisms by using various graph and stochastic models. The book begins with an introduction to the Android operating system accompanied by the limitations of the state-of-the-art static malware detection mechanisms as well as a detailed presentation of a hybrid malware detection mechanism. The text then presents four different system call-based dynamic Android malware detection mechanisms using graph centrality measures, graph signal processing and graph convolutional networks. Further, the text shows how most of the Android malware can be detected by checking the presence of a unique subsequence of system calls in its system call sequence. All the malware detection mechanisms presented in the book are based on the authors' recent research. The experiments are conducted with the latest Android malware samples, andthe malware samples are collected from public repositories. The source codes are also provided for easy implementation of the mechanisms. This book will be highly useful to Android malware researchers, developers, students and cyber security professionals to explore and build defense mechanisms against the ever-evolving Android malware. | ||
650 | 0 | |a Mobile communication systems |x Security measures | |
650 | 0 | |a Mobile computing |x Security measures | |
650 | 0 | |a Computer crimes |x Prevention | |
650 | 0 | |a Malware (Computer software) | |
650 | 4 | |a Radiocommunications mobiles ; Sécurité ; Mesures | |
650 | 4 | |a Informatique mobile ; Sécurité ; Mesures | |
650 | 4 | |a Logiciels malveillants | |
650 | 4 | |a COMPUTERS / Security / Viruses | |
650 | 4 | |a COMPUTERS / Networking / Security | |
650 | 4 | |a Computer crimes ; Prevention | |
650 | 4 | |a Malware (Computer software) | |
700 | 1 | |a John, Teenu S. |e VerfasserIn |4 aut | |
700 | 1 | |a Surendran, Roopak |e VerfasserIn |4 aut | |
700 | 1 | |a Alazab, Mamoun |d 1980- |e VerfasserIn |4 aut | |
776 | 1 | |z 0367638711 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 0367638711 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781000824988/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-092806856 |
---|---|
_version_ | 1829007847905558528 |
adam_text | |
any_adam_object | |
author | Thomas, Tony John, Teenu S. Surendran, Roopak Alazab, Mamoun 1980- |
author_facet | Thomas, Tony John, Teenu S. Surendran, Roopak Alazab, Mamoun 1980- |
author_role | aut aut aut aut |
author_sort | Thomas, Tony |
author_variant | t t tt t s j ts tsj r s rs m a ma |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)092806856 (DE-599)KEP092806856 (ORHE)9781000824988 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | First edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04110cam a22006612c 4500</leader><controlfield tag="001">ZDB-30-ORH-092806856</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121850.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230530s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000824971</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-000-82497-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000824977</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-000-82497-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003121510</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-003-12151-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1003121519</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-003-12151-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000824988</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-000-82498-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000824985</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-000-82498-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)092806856</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP092806856</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781000824988</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)092806856</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UT</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Thomas, Tony</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Intelligent mobile malware detection</subfield><subfield code="c">Tony Thomas, Roopak Surendran and Teenu S. John, Mamoun Alazab</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, FL</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2023</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Security, privacy, and trust in mobile communications</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on February 07, 2023)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The popularity of Android mobile phones has caused more cybercriminalstocreate malware applications that carry out various malicious activities. The attacks, whichescalatedafter the COVID-19 pandemic, proved there is great importance in protecting Android mobile devices from malware attacks. Intelligent Mobile Malware Detection will teach users how to develop intelligent Android malware detection mechanisms by using various graph and stochastic models. The book begins with an introduction to the Android operating system accompanied by the limitations of the state-of-the-art static malware detection mechanisms as well as a detailed presentation of a hybrid malware detection mechanism. The text then presents four different system call-based dynamic Android malware detection mechanisms using graph centrality measures, graph signal processing and graph convolutional networks. Further, the text shows how most of the Android malware can be detected by checking the presence of a unique subsequence of system calls in its system call sequence. All the malware detection mechanisms presented in the book are based on the authors' recent research. The experiments are conducted with the latest Android malware samples, andthe malware samples are collected from public repositories. The source codes are also provided for easy implementation of the mechanisms. This book will be highly useful to Android malware researchers, developers, students and cyber security professionals to explore and build defense mechanisms against the ever-evolving Android malware.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Mobile communication systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Mobile computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Malware (Computer software)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Radiocommunications mobiles ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatique mobile ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels malveillants</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Security / Viruses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Networking / Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes ; Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Malware (Computer software)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">John, Teenu S.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Surendran, Roopak</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Alazab, Mamoun</subfield><subfield code="d">1980-</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">0367638711</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">0367638711</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781000824988/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-092806856 |
illustrated | Not Illustrated |
indexdate | 2025-04-10T09:36:49Z |
institution | BVB |
isbn | 9781000824971 1000824977 9781003121510 1003121519 9781000824988 1000824985 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | CRC Press |
record_format | marc |
series2 | Security, privacy, and trust in mobile communications |
spelling | Thomas, Tony VerfasserIn aut Intelligent mobile malware detection Tony Thomas, Roopak Surendran and Teenu S. John, Mamoun Alazab First edition. Boca Raton, FL CRC Press 2023 ©2023 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Security, privacy, and trust in mobile communications Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on February 07, 2023) The popularity of Android mobile phones has caused more cybercriminalstocreate malware applications that carry out various malicious activities. The attacks, whichescalatedafter the COVID-19 pandemic, proved there is great importance in protecting Android mobile devices from malware attacks. Intelligent Mobile Malware Detection will teach users how to develop intelligent Android malware detection mechanisms by using various graph and stochastic models. The book begins with an introduction to the Android operating system accompanied by the limitations of the state-of-the-art static malware detection mechanisms as well as a detailed presentation of a hybrid malware detection mechanism. The text then presents four different system call-based dynamic Android malware detection mechanisms using graph centrality measures, graph signal processing and graph convolutional networks. Further, the text shows how most of the Android malware can be detected by checking the presence of a unique subsequence of system calls in its system call sequence. All the malware detection mechanisms presented in the book are based on the authors' recent research. The experiments are conducted with the latest Android malware samples, andthe malware samples are collected from public repositories. The source codes are also provided for easy implementation of the mechanisms. This book will be highly useful to Android malware researchers, developers, students and cyber security professionals to explore and build defense mechanisms against the ever-evolving Android malware. Mobile communication systems Security measures Mobile computing Security measures Computer crimes Prevention Malware (Computer software) Radiocommunications mobiles ; Sécurité ; Mesures Informatique mobile ; Sécurité ; Mesures Logiciels malveillants COMPUTERS / Security / Viruses COMPUTERS / Networking / Security Computer crimes ; Prevention John, Teenu S. VerfasserIn aut Surendran, Roopak VerfasserIn aut Alazab, Mamoun 1980- VerfasserIn aut 0367638711 Erscheint auch als Druck-Ausgabe 0367638711 |
spellingShingle | Thomas, Tony John, Teenu S. Surendran, Roopak Alazab, Mamoun 1980- Intelligent mobile malware detection Mobile communication systems Security measures Mobile computing Security measures Computer crimes Prevention Malware (Computer software) Radiocommunications mobiles ; Sécurité ; Mesures Informatique mobile ; Sécurité ; Mesures Logiciels malveillants COMPUTERS / Security / Viruses COMPUTERS / Networking / Security Computer crimes ; Prevention |
title | Intelligent mobile malware detection |
title_auth | Intelligent mobile malware detection |
title_exact_search | Intelligent mobile malware detection |
title_full | Intelligent mobile malware detection Tony Thomas, Roopak Surendran and Teenu S. John, Mamoun Alazab |
title_fullStr | Intelligent mobile malware detection Tony Thomas, Roopak Surendran and Teenu S. John, Mamoun Alazab |
title_full_unstemmed | Intelligent mobile malware detection Tony Thomas, Roopak Surendran and Teenu S. John, Mamoun Alazab |
title_short | Intelligent mobile malware detection |
title_sort | intelligent mobile malware detection |
topic | Mobile communication systems Security measures Mobile computing Security measures Computer crimes Prevention Malware (Computer software) Radiocommunications mobiles ; Sécurité ; Mesures Informatique mobile ; Sécurité ; Mesures Logiciels malveillants COMPUTERS / Security / Viruses COMPUTERS / Networking / Security Computer crimes ; Prevention |
topic_facet | Mobile communication systems Security measures Mobile computing Security measures Computer crimes Prevention Malware (Computer software) Radiocommunications mobiles ; Sécurité ; Mesures Informatique mobile ; Sécurité ; Mesures Logiciels malveillants COMPUTERS / Security / Viruses COMPUTERS / Networking / Security Computer crimes ; Prevention |
work_keys_str_mv | AT thomastony intelligentmobilemalwaredetection AT johnteenus intelligentmobilemalwaredetection AT surendranroopak intelligentmobilemalwaredetection AT alazabmamoun intelligentmobilemalwaredetection |