A Scalable Implementation of Malware Detection Based on Network Connection Behaviors

Author(s):  
Liang Shi ◽  
Jialan Que ◽  
Zhenyu Zhong ◽  
Brett Meyer ◽  
Patrick Crenshaw ◽  
...  
2018 ◽  
Vol 6 (12) ◽  
pp. 879-887
Author(s):  
Om Prakash Samantray ◽  
Satya Narayana Tripathy ◽  
Susant Kumar Das

2020 ◽  
Author(s):  
Sasqia Ismi Aulia ◽  

This study aims to design a LAN network for data backup systems that are in accordance with certain aspects such as the selection of network design, network hardware, network transmission media, network connection devices, and network operating systems. Data is the most important thing for everyone, data can usually be reused even though it has not been used for some time, and therefore data storage is a serious problem that must be considered. Data on the server computer is very important to be maintained so that a backup process is needed on that data to another computer that is used as a backup in the event of damage to the hardware and software of the server computer. FTP is one of the solutions to the problems faced above,where FTP can be used to process the download and upload between the server and client computers. This design uses the Autobot system. The expected benefit in designing this LAN is that the existing network at SMP Negeri 6 Pekanbaru is not only used by employees and employees but can be used and enjoyed by teachers and students to access the internet anywhere as long as it is still within the scope of the SMP Negeri 6 area Pekanbaru.


2011 ◽  
Vol 31 (4) ◽  
pp. 1006-1009
Author(s):  
Ning GUO ◽  
Xiao-yan SUN ◽  
He LIN ◽  
Hua MOU

2010 ◽  
Vol 24 (2) ◽  
pp. 119-124 ◽  
Author(s):  
Chao Zhang ◽  
Fushun Nian ◽  
Shengli Liang ◽  
Zhiying Cao

2020 ◽  
Vol 14 ◽  
Author(s):  
Meghna Dhalaria ◽  
Ekta Gandotra

Purpose: This paper provides the basics of Android malware, its evolution and tools and techniques for malware analysis. Its main aim is to present a review of the literature on Android malware detection using machine learning and deep learning and identify the research gaps. It provides the insights obtained through literature and future research directions which could help researchers to come up with robust and accurate techniques for classification of Android malware. Design/Methodology/Approach: This paper provides a review of the basics of Android malware, its evolution timeline and detection techniques. It includes the tools and techniques for analyzing the Android malware statically and dynamically for extracting features and finally classifying these using machine learning and deep learning algorithms. Findings: The number of Android users is expanding very fast due to the popularity of Android devices. As a result, there are more risks to Android users due to the exponential growth of Android malware. On-going research aims to overcome the constraints of earlier approaches for malware detection. As the evolving malware are complex and sophisticated, earlier approaches like signature based and machine learning based are not able to identify these timely and accurately. The findings from the review shows various limitations of earlier techniques i.e. requires more detection time, high false positive and false negative rate, low accuracy in detecting sophisticated malware and less flexible. Originality/value: This paper provides a systematic and comprehensive review on the tools and techniques being employed for analysis, classification and identification of Android malicious applications. It includes the timeline of Android malware evolution, tools and techniques for analyzing these statically and dynamically for the purpose of extracting features and finally using these features for their detection and classification using machine learning and deep learning algorithms. On the basis of the detailed literature review, various research gaps are listed. The paper also provides future research directions and insights which could help researchers to come up with innovative and robust techniques for detecting and classifying the Android malware.


2015 ◽  
Vol 8 (1) ◽  
Author(s):  
Swati Ganeti ◽  
Rajat Agarwal ◽  
Murali Krishna Medudula ◽  
Mahim Sagar

Telecom industry is one of those industries which has changed dramatically during the past decade. With more and more players entering in this industry, competition is ever increasing. The war between these players is slowly shifting from the price to the augmentation. This paper aims at exploring such factors which influence a customers preference of one telecom service provider (TSP) over the other. It is a descriptive research where study has been conducted among the consumers of different telecom service providers (TSPs). By reviewing the existing literature in this domain, we explored different factors which affect the consumers decision to prefer one telecom service provider over the other. A consumer targeted questionnaire was designed where consumers were asked about the factors they consider (with their relative importance quantified using Likert scale), before buying a new network connection to know the relative importance of the various factors. Factor Analysis was performed to club various variables into distinct factors. Statistical techniques then helped in identifying the relative importance. From the Factor Loading matrix the following five factors were generated:- Overall service quality, Point of Purchase Differentiator, Promotion Measures, Tariff Plans and Size of the Network. Further study in the behavioural perceptions of consumer shows that the most important factor in influencing the customer buying behavior is Service Quality. The second most important factor is cost and various plans offered by the telecom service provider. Network connectivity was considered by almost all the respondents and consumers prefer the largest network player. The study also found that promotional measures dont influence the customers as expected.


Sign in / Sign up

Export Citation Format

Share Document