Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/593266
Title: | Investigations on android malware detection in adversarial settings |
Researcher: | Shymala gowri, S |
Guide(s): | Sudha sadasivam, G |
Keywords: | adversarial settings android malware Engineering Engineering and Technology Engineering Multidisciplinary |
University: | Anna University |
Completed Date: | 2024 |
Abstract: | newline Smartphone usage has become an indispensable activity of late with the Android Operating System (OS) having a magnanimous volume of usage. Due to its open source nature, Android OS based applications lure attackers. Malicious software intentionally manifests multi-sided violations without the consent of end-users and could accentuate illicit financial gains. Therefore, there is a need to raise the stakes to protect sensitive data. Tackling the rapid upsurge in the volume and veracity of malware variants have become a demanding need for automation of security solutions like Anti Malware Engine (AME) otherwise called Anti Virus (AV) software. Combating malware is a cyclical arms race between security analysts and attackers. To streamline and speed up the ability to retaliate malware, applying learning based techniques has become a prospective solution. Thus, malware detection models can be built by utilizing Machine Learning (ML) or Deep Learning (DL) or ensemble classification algorithms which can recognize and categorize an incoming sample as malware or goodware. Natively, learning based models function using the Independent and Identically Distributed (IID) assumption which states that the training and testing data are identical and independent of each other. But, in real-world usage of learning based models, distribution of data contained in training and test dataset can be significantly different causing non - stationary environment. Attackers intentionally attempt to violate the underlying IID assumptions made by classifiers to disrupt the working of learning based models. Attacks can occur at model training time or model inference time. |
Pagination: | xxv,287p. |
URI: | http://hdl.handle.net/10603/593266 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 49.49 kB | Adobe PDF | View/Open |
02_prelim_pages.pdf | 2.51 MB | Adobe PDF | View/Open | |
03_contents.pdf | 344.61 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 66.79 kB | Adobe PDF | View/Open | |
05_chapter1.pdf | 1.41 MB | Adobe PDF | View/Open | |
06_chapter2.pdf | 833.91 kB | Adobe PDF | View/Open | |
07_chapter3.pdf | 973.37 kB | Adobe PDF | View/Open | |
08_chapter4.pdf | 1.63 MB | Adobe PDF | View/Open | |
09_chapter5.pdf | 1.85 MB | Adobe PDF | View/Open | |
10_chapter6.pdf | 957.76 kB | Adobe PDF | View/Open | |
11_annexures.pdf | 193.13 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 61.27 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: