Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

LIST OF TABLES

TABLE NO TITLE PAGE NO

6.1 Proposed Simulation parameters 151

6.2 Analysis of the Accuracy 152

Comparison of existing techniques with the


6.3 156
proposed method

xi
LIST OF FIGURES

FIGURE PAGE
TITLE
NO. NO
1.1 Types of malwares 6

1.2 Naming scheme 9

Approaches and Classification of Android Malware


1.3 12
Detection

1.4 Malware detection Techniques 13

1.5 Machine learning based malware detection 15

1.6 URLs based Malware detection 18

1.7 Behaviors based Host security 19

1.8 Deep learning based Malicious Classifier 21

1.9 Safety and Usability 21

3.1 Proposed Block diagram for GCRNC 122

An Adaboost Random Decision Tree based Feature


3.2 124
selection Architecture

Gradient Conventional Recursive Neural Classifier


3.3 126
(GCRNC) Architecture

3.4 Proposed architecture diagram 128

Proposed block diagram for malicious software


4.1 134
detection

5.1 Architecture of Proposed URL-API Detection Method 145

6.1 Analysis of Accuracy 152

6.2 Analysis of Precision, Recall and F-Measure 153

6.3 Analysis of Time complexity 153

6.4 Analysis of the precision 154

6.5 Analysis of the Recall 154

xii
FIGURE PAGE
TITLE
NO. NO
6.6 Analysis of the Accuracy 155

6.7 Analysis of the Error Rate 155

6.8 Analysis of the Time complexity 156

6.9 Analysis of the Accuracy 157

6.10 Analysis of the Precision 157

6.11 Analysis of the Recall 158

6.12 Analysis of the Error Rate 158

6.13 Analysis of the Time complexity 159

xiii
LIST OF SYMBOLS AND ABBREVIATIONS

SB Signature-based

AB Anomaly-based

SPB Specification-Based

ML Machine Learning
GCRNC Gradient Conventional Recursive Neural Classifier

AGSVR Adaptive Gradient Support Vector Regression

DRM Digital Rights Management

RAA Reconfigurable Array Architecture


OS Operating Systems

API Application Programming Interface

DQFSA Deep Q-learning based Feature Selection Architecture

DGA Domain Generation Algorithm


AI Artificial Intelligence

URL Uniform Resource Locator

BTM Block Chain Trust Model

SDN Software Defined Networking


CPS Cyber Physical Systems

IoT Internet of Things

IDSs Intrusion Detection Systems


SOC Security Operations Center

DNS Domain Name System

DoS Denial of Service

RaaS Ransomware as a Service


ANDA Adaptive Normalized Data Analysis

IoS Internet of Services

xiv
LRSR Link Redirection Soundness Rate

SCS Successive Certificate Signing


DSNC Deep Spectral Neural Classification

DTM Domain Transformation Matrix

LCS Longest Normal Subsequence

KNN K-Nearest Neighbor

xv

You might also like