期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
印刷版ISSN:2320-9798
电子版ISSN:2320-9801
出版年度:2019
卷号:7
期号:5
页码:3178-3183
DOI:10.15680/IJIRCCE.2019. 0705096
出版社:S&S Publications
摘要:To understand the locus-standi of malware we hereby elaborating the channels which is responsible to
distribute or dispense these harmful segments of program using underneath resources. Subsequently, by and large, any
information transmission and correspondence channel can fill in as an assault and malware conveyance vector.
Channels which are not implied for transmitting programming may at present be taken control of by regular methods
for expecting command over any application's or administration's control stream because of mistaken programming.
These vectors incorporate USB, Bluetooth, and NFS (Network File System) and their associations, scanner tags, QR
codes, unbound remote associations which can be abused to infuse information, mistaken GSM/UMTS/LTE radio
bundle dealing with, and some more. Normal correspondence channels which are intended to convey programming are
the official Google Play Store and outsider application markets. In the accompanying, we will concentrate on the most
imperative contamination channels for regular malware which can be found in the world today. For additional inside
and out data on Android engendering channels, tenacious contamination, and malware approach all in all, allude to our
best of techniques using machine learning specially using Support Vector Machine.
关键词:Machine Learning; Malware Detection; Android; Support Vector Machine; Binary Vector Generation
Distributed Denial of Services; Spyware; Trojan;