{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T03:34:22Z","timestamp":1725852862592},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319318103"},{"type":"electronic","value":"9783319318110"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31811-0_17","type":"book-chapter","created":{"date-parts":[[2016,4,1]],"date-time":"2016-04-01T06:59:22Z","timestamp":1459493962000},"page":"274-291","source":"Crossref","is-referenced-by-count":7,"title":["MBotCS: A Mobile Botnet Detection System Based on Machine Learning"],"prefix":"10.1007","author":[{"given":"Xin","family":"Meng","sequence":"first","affiliation":[]},{"given":"George","family":"Spanoudakis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,2]]},"reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/978-3-642-12368-9_3","volume-title":"Information Security Theory and Practices","author":"T Alpcan","year":"2010","unstructured":"Alpcan, T., Bauckhage, C., Schmidt, A.-D.: A probabilistic diffusion scheme for anomaly detection on smartphones. In: Samarati, P., Tunstall, M., Posegga, J., Markantonakis, K., Sauveron, D. (eds.) WISTP 2010. LNCS, vol. 6033, pp. 31\u201346. Springer, Heidelberg (2010)"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Batyuk, L., Herpich, M.: Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications. In: 2011 6th International Conference Malicious Unwanted Software, pp. 66\u201372 (2011)","DOI":"10.1109\/MALWARE.2011.6112328"},{"issue":"6","key":"17_CR3","first-page":"1114","volume":"3","author":"D Bhargava","year":"2013","unstructured":"Bhargava, D., et al.: Decision tree analysis on j48 algorithm for data mining. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(6), 1114\u20131119 (2013)","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Bl\u00e4sing, T., et al.: An android application sandbox system for suspicious software detection. In: Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software, pp. 55\u201362 (2010)","DOI":"10.1109\/MALWARE.2010.5665792"},{"issue":"12","key":"17_CR5","doi-asserted-by":"publisher","first-page":"1213","DOI":"10.1093\/bioinformatics\/17.12.1213","volume":"17","author":"MV Boland","year":"2001","unstructured":"Boland, M.V., Murphy, R.F.: A neural network classifier capable of recognizing the patterns of all major subcellular structures in fluorescence microscope images of HeLa cells. Bioinformatics 17(12), 1213\u20131223 (2001)","journal-title":"Bioinformatics"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Braun, L., M\u00fcnz, G., Carle, G.: Packet sampling for worm and botnet detection in TCP connections. In: Proceedings of the 2010 IEEE\/IFIP Network Operations and Management Symposium, NOMS 2010, pp. 264\u2013271 (2010)","DOI":"10.1109\/NOMS.2010.5488473"},{"key":"17_CR7","volume-title":"Wireshark 101: Essential Skills for Network Analysis","author":"LA Chappell","year":"2013","unstructured":"Chappell, L.A., Combs, G.: Wireshark 101: Essential Skills for Network Analysis. Protocol Analysis Institute, Chappell University, San Jose (2013)"},{"key":"17_CR8","unstructured":"Funk C., Garnaeva M.: Kaspersky security bulletin (2013). \n                      https:\/\/securelist.com\/analysis\/kaspersky-security-bulletin\/58265\/kaspersky-security-bulletin-2013-overall-statistics-for-2013"},{"key":"17_CR9","unstructured":"Cisco: Cisco visual networking index: Global mobile data traffic forecast update, 2014\u20132019. Tech. report (2015). \n                      http:\/\/www.cisco.com\/en\/US\/solutions\/collateral\/ns341\/ns525\/ns537\/ns705\/ns827\/white_paper_c11-520862.html"},{"key":"17_CR10","unstructured":"Cunningham, P., Delany, S.J.: k-nearest neighbour classifiers. In: Multiple Classifier Systems, pp. 1\u201317 (2007)"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Eslahi, M., Salleh, R., Anuar, N.B.: MoBots: a new generation of botnets on mobile devices and networks. In: 2012 International Symposium on Computer Applications and Industrial Electronics, pp. 262\u2013266 (2012)","DOI":"10.1109\/ISCAIE.2012.6482109"},{"issue":"4","key":"17_CR12","first-page":"251","volume":"26","author":"A Feizollah","year":"2014","unstructured":"Feizollah, A., et al.: A study of machine learning classifiers for anomaly-based mobile botnet detection. Malays. J. Comput. Sci. 26(4), 251\u2013265 (2014)","journal-title":"Malays. J. Comput. Sci."},{"key":"17_CR13","unstructured":"Google: Google IP address ranges. \n                      https:\/\/support.google.com\/a\/answer\/60764?hl=en\n                      \n                    . Accessed June 2015"},{"key":"17_CR14","unstructured":"Google: Dashboards. \n                      https:\/\/developer.android.com\/about\/dashboards\/index.html\n                      \n                    . Accessed June 2015"},{"issue":"1","key":"17_CR15","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall, M., et al.: The WEKA data mining software: an update. ACM SIGKDD Explor. Newsletter 11(1), 10\u201318 (2009)","journal-title":"ACM SIGKDD Explor. Newsletter"},{"key":"17_CR16","unstructured":"Kalige, E., Burkey, D.: A case study of Eurograbber: How 36 million euros was stolen via malware. Versafe (White paper) (2012)"},{"key":"17_CR17","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-642-17502-2_12","volume-title":"Security and Privacy in Mobile Information and Communication Systems","author":"P Porras","year":"2010","unstructured":"Porras, P., Sa\u00efdi, H., Yegneswaran, V.: An analysis of the iKee.B iPhone Botnet. In: Schmidt, A.U., Russello, G., Lioy, A., Prasad, N.R., Lian, S. (eds.) MobiSec 2010. LNICST, vol. 47, pp. 141\u2013152. Springer, Heidelberg (2010)"},{"key":"17_CR18","unstructured":"Reina, A., Fattori, A., Cavallaro, L.: A system call-centric analysis and stimulation technique to automatically reconstruct android malware behaviors. In: EuroSec, April 2013"},{"key":"17_CR19","unstructured":"Rish, I.: An empirical study of the naive Bayes classifier. In: IJCAI 2001 Workshop on Empirical Methods in Artificial Intelligence, vol. 3, no. 22, pp. 41\u201346 (2001)"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Schmidt, A.D., et al.: Static analysis of executables for collaborative malware detection on android. In: IEEE International Conference on Communications 2009, pp. 1\u20135 (2009)","DOI":"10.1109\/ICC.2009.5199486"},{"issue":"1","key":"17_CR21","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/s11036-008-0113-x","volume":"14","author":"AD Schmidt","year":"2009","unstructured":"Schmidt, A.D., et al.: Monitoring smartphones for anomaly detection. Mob. Netw. Appl. 14(1), 92\u2013106 (2009)","journal-title":"Mob. Netw. Appl."},{"key":"17_CR22","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.jnca.2013.05.008","volume":"38","author":"SH Seo","year":"2014","unstructured":"Seo, S.H., Gupta, A., Sallam, A.M., Bertino, E., Yim, K.: Detecting mobile malware threats to homeland security through static analysis. J. Netw. Comput. Appl. 38, 43\u201353 (2014)","journal-title":"J. Netw. Comput. Appl."},{"key":"17_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-642-04342-0_23","volume-title":"Recent Advances in Intrusion Detection","author":"A Shabtai","year":"2009","unstructured":"Shabtai, A., Kanonov, U., Elovici, Y.: Detection, alert and response to malicious behavior in mobile devices: knowledge-based approach. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol. 5758, pp. 357\u2013358. Springer, Heidelberg (2009)"},{"issue":"1","key":"17_CR24","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s10844-010-0148-x","volume":"38","author":"A Shabtai","year":"2012","unstructured":"Shabtai, A., et al.: \u201cAndromaly\u201d: a behavioral malware detection framework for android devices. J. Intell. Inf. Syst. 38(1), 161\u2013190 (2012)","journal-title":"J. Intell. Inf. Syst."},{"issue":"1","key":"17_CR25","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/S0004-3702(96)00025-2","volume":"90","author":"Y Shahar","year":"1997","unstructured":"Shahar, Y.: A framework for knowledge-based temporal abstraction. Artif. Intell. 90(1), 79\u2013133 (1997)","journal-title":"Artif. Intell."},{"key":"17_CR26","doi-asserted-by":"crossref","unstructured":"Spreitzenbarth, M., et al.: Mobile-sandbox: having a deeper look into android applications. In: 28th Annual ACM Symposium on Applied Computing, pp. 1808\u20131815. ACM (2013)","DOI":"10.1145\/2480362.2480701"},{"key":"17_CR27","unstructured":"Strazzere, T.: The new not compatible: Sophisticated and evasive threat harbors the potential to compromise enterprise networks. \n                      https:\/\/blog.lookout.com\/blog\/2014\/11\/19\/notcompatible\/\n                      \n                    . Accessed June 2015"},{"key":"17_CR28","unstructured":"Tanner, G.: Gsam battery monitor. \n                      https:\/\/play.google.com\/store\/apps\/details?id=com.gsamlabs.bbm&hl=en_GB\n                      \n                    . Accessed June 2015"},{"key":"17_CR29","unstructured":"Taosoftware: tpacketcapture. \n                      https:\/\/play.google.com\/store\/apps\/details?id=jp.co.taosoftware.android.packetcapture\n                      \n                    . Accessed June 2015"},{"key":"17_CR30","unstructured":"Team, B.R., et al.: Sanddroid: an APK analysis sandbox. Xi\u2019an jiaotong university (2014). \n                      http:\/\/sanddroid.xjtu.edu.cn\/\n                      \n                    . Accessed June 2015"},{"key":"17_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-642-15877-3_7","volume-title":"Future Internet - FIS 2010","author":"I Vural","year":"2010","unstructured":"Vural, I., Venter, H.: Mobile botnet detection using network forensics. In: Berre, A.J., G\u00f3mez-P\u00e9rez, A., Tutschku, K., Fensel, D. (eds.) FIS 2010. LNCS, vol. 6369, pp. 57\u201367. Springer, Heidelberg (2010)"},{"issue":"6","key":"17_CR32","first-page":"750","volume":"18","author":"I Vural","year":"2012","unstructured":"Vural, I., Venter, H.S.: Combating mobile spam through botnet detection using artificial immune systems. J. UCS 18(6), 750\u2013774 (2012)","journal-title":"J. UCS"},{"key":"17_CR33","unstructured":"Wireshark: The wireshark network analyzer 1.12.2. \n                      https:\/\/www.wireshark.org\/docs\/man-pages\/tshark.html\n                      \n                    . Accessed June 2015"},{"key":"17_CR34","unstructured":"Xiang, C., et al.: Andbot: towards advanced mobile botnets. In: 4th USENIX Conference on Large-Scale Exploits and Emergent Threats. USENIX Association (2011)"},{"key":"17_CR35","unstructured":"Zhou, W., et al.: Fast, scalable detection of \u201cpiggybacked\u201d mobile applications. In: 3rd ACM Conference on Data and application security and privacy - CODASPY 2013, p. 185 (2013). \n                      http:\/\/dl.acm.org\/citation.cfm?doid=2435349.2435377"},{"key":"17_CR36","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: IEEE Symposium on Security and Privacy (SP 2012), pp. 95\u2013109. IEEE (2012)","DOI":"10.1109\/SP.2012.16"},{"key":"17_CR37","unstructured":"Zorz, Z.: Android trojan with botnet capabilities found in the wild. \n                      http:\/\/www.net-security.org\/malware_news.php?id=1577\n                      \n                    . Accessed June 2015"}],"container-title":["Lecture Notes in Computer Science","Risks and Security of Internet and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31811-0_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:58:50Z","timestamp":1559415530000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31811-0_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319318103","9783319318110"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31811-0_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}