Back to Search
Start Over
Mobile botnets detection based on machine learning over system calls
- Source :
- International Journal of Security and Networks. 14:103
- Publication Year :
- 2019
- Publisher :
- Inderscience Publishers, 2019.
-
Abstract
- Mobile botnets are a growing threat to the internet security field. These botnets target less secure devices with lower computational power, while sometimes taking advantage of features specific to them, e.g., SMS messages. We propose a host-based approach using machine learning techniques to detect mobile botnets with features derived from system calls. Patterns created tend to be shared among applications with similar actions. Therefore, different botnets are likely to share similar system call patterns. To measure the effectiveness of our approach, a dataset containing multiple botnets and legitimate applications was created. We carried out three experiments, namely finding out the best time-window, and performing feature selection and hyperparameter tuning. A high performance (over 84%) was achieved in multiple metrics across multiple machine learning algorithms. An in-depth analysis of the features is also presented to help future work with a solid discussion about system call-based features.
- Subjects :
- Short Message Service
Computer Networks and Communications
Computer science
Botnet
Feature selection
02 engineering and technology
Machine learning
computer.software_genre
Host-based approach
Field (computer science)
System call
0202 electrical engineering, electronic engineering, information engineering
Electrical and Electronic Engineering
Safety, Risk, Reliability and Quality
Hyperparameter
business.industry
Mobile botnet detection
020206 networking & telecommunications
020201 artificial intelligence & image processing
The Internet
Artificial intelligence
business
computer
Host (network)
Subjects
Details
- ISSN :
- 17478413 and 17478405
- Volume :
- 14
- Database :
- OpenAIRE
- Journal :
- International Journal of Security and Networks
- Accession number :
- edsair.doi.dedup.....2979a03392c95c778cc3fa29093ccdea