...
首页> 外文期刊>Data in Brief >Data on Vulnerability Detection in Android
【24h】

Data on Vulnerability Detection in Android

机译:关于Android漏洞检测的数据

获取原文
   

获取外文期刊封面封底 >>

       

摘要

The data in this article have been collaborated from mainly four sources- Google Playstore,11Google Playstorehttps://play.google.com/store/apps.Wandoujia22Wandoujia appshttp://www.wandoujia.com/apps.(third party app store market), AMD33AMDhttp://amd.arguslab.org/sharing.and Androzoo.44Androzoohttps://androzoo.uni.lu/access.These data include ~85,000 APKs (Android Package Kit), both malicious and benign from these data sources. Static and dynamic features are extracted from these APK files, and then supervised machines learning algorithms are employed for malware detection in Android. This data article also provides the Python code for data analysis. For feature extraction, a generic algorithm has also been incorporated, thereby, selecting important and relevant feature subset. Conclusive results obtained from this data set are further comprehended and interpreted in our latest research study “A Novel Parallel Classifier Scheme for Vulnerability Detection in Android” (Garg et al., 2018). This proved to be precious contribution for ensembling classifiers in machine learning to detect malware in Android.
机译:本文中的数据已从主要是四个来源合作 - Google PlayStore,11Google PlayStorehtttps://play.google.com/store/apps.wandoujia22wandoujia appshttp://www.wandoujia.com/apps。(第三方应用商店市场),AMD33AMDHTTP://amd.arguslab.org/sharing.and androzoo.44Androzoohtps://androzoo.uni.lu/access.these数据包括〜85,000 APKS(Android Package Kit),既有恶意和良性来自这些数据源。从这些APK文件中提取静态和动态特征,然后在Android中使用监督机器学习算法用于恶意软件检测。此数据文章还提供了用于数据分析的Python代码。对于特征提取,还已经合并了通用算法,从而选择了重要的特征子集。在我们最新的研究研究中进一步理解和解释了从该数据集获得的结论性结果“Android中的漏洞检测新的并行分类机构”(Garg等,2018)。这被证明是对机器学习中的分类器来检测Android中恶意软件的珍贵贡献。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号