Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Hossen, Mohammad Sahinur
- Malware Detection in Web Browser Plugins Using API Calls with Permissions
Abstract Views :88 |
PDF Views:0
Authors
Mohammad Sahinur Hossen
1,
Rakibul Islam
1,
Md Nasef Ur Rahman Chowdhury
1,
Ahshanul Haque
1,
Qudrat E Alahy Ratul
2
Affiliations
1 Department of Computer Science, New Mexico Institute of Mining and Technology, Boise State University, US
2 Department of Computer Science, Boise State University, US
1 Department of Computer Science, New Mexico Institute of Mining and Technology, Boise State University, US
2 Department of Computer Science, Boise State University, US
Source
International Journal of Advanced Networking and Applications, Vol 14, No 6 (2023), Pagination: 5672-5677Abstract
With the exponential growth of internet users, web browsers play an essential role in gathering knowledge, social networking etc. Browser plugin/add-on is a unique feature of modern browsers that allows for adding new gimmicks to the browser functionality. Although this tool is handy, it poses a significant risk as it can collect and store users browsing history, passwords and more. Hence, attackers can try injecting malicious browser add-ons that can utilize security loopholes wherein the attacker may access user-critical data on the host device. The Smart Extension Malware Detector (SEMD), a reliable browser malware detection system that relies on extension development API calls and privileges using outfit machine learning approaches, was suggested and created by us. The research outcomes demonstrate that the SEMD model outperformed peer models while lowering the difficulty of the detection procedure.Keywords
Malware Detection, Browser Add-Ons, Machine Learning.References
- M. Weissbacher, E. Mariconti, G. Suarez-Tangil, G. Stringh- ini, W. Robertson, and E. Kirda. Ex-ray: detection of history- leaking browser extensions. In Dec. 2017.
- Y. Wang, W. Cai, P. Lyu, and W. Shao. A combined static and dynamic analysis approach to detect malicious browser extensions. Security and Communication Networks, 2018, May 2018.
- R. Islam, M. S. Hossen, and D. Shin. A mapping study on privacy attacks in big data and iot. In 2022 13th International Conference on Information and Communication Technology Convergence (ICTC), 2022.
- S. Talukder and Z. Talukder. A survey on malware detection and analysis tools. International Journal of Network Security Its Applications, 12, Mar. 2020.
- A. Dhammi and M. P. Singh. Behavior analysis of malware using machine learning. 2015 Eighth International Conference on Contemporary Computing (IC3), 2015.
- A. Damodaran, F. Di Troia, C. A. Visaggio, T. Austin, and M. Stamp. A comparison of static, dynamic, and hybrid analysis for malware detection. Journal of Computer Virology and Hacking Techniques, 13, Feb. 2017.
- F. Cohen. A formal definition of computer worms and some related results. Computers Security, 11(7), 1992.
- 12 Types of Malware + Examples That You Should Know — crowdstrike.com. https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/. [Accessed 24-Aug2022].
- Z. Zhenfang. Study on computer trojan horse virus and its prevention. International Journal of Engineering and Applied Sciences, 2(8), Aug. 2015.
- T. Stafford and A. Urbaczewski. Spyware: the ghost in the machine. In volume 14, Jan. 2004.
- P. Tuli and P. Sahu. System monitoring and security using keylogger. In 2013.
- J. Gao, L. Li, P. Kong, T. Bissyande ́, and J. Klein. Should you consider adware as malware in your study? In Feb. 2019.
- P. Okane, S. Sezer, and D. Carlin. Evolution of ransomware. IET Networks, 7, May 2018.
- A. Afreen, M. Aslam, and S. Ahmed. Analysis of fileless malware and its evasive behavior. In Oct. 2020.
- B. Sanjay, D. Rakshith, R. Akash, and V. V. Hegde. An approach to detect fileless malware and defend its evasive mechanisms. In 2018 3rd International Conference on Computational Systems and Information Technology for Sustain- able Solutions (CSITSS). IEEE, 2018.
- S. S. Silva, R. M. Silva, R. C. Pinto, and R. M. Salles. Botnets: a survey. Computer Networks, 57(2), 2013.
- L. Liu, X. Zhang, G. Yan, and S. Chen. Chrome extensions: threat analysis and countermeasures. In NDSS, 2012.
- H. Shahriar, K. Weldemariam, M. Zulkernine, and T. Lutel- lier. Effective detection of vulnerable and malicious browser extensions. Computers Security, 47, Nov. 2014.
- N. Pantelaios, N. Nikiforakis, and A. Kapravelos. You’ve changed: detecting malicious browser extensions through their update deltas. In Oct. 2020.
- A. Barth, A. Felt, P. Saxena, and A. Boodman. Protecting browsers from extension vulnerabilities. In Jan. 2010.
- Q. E. A. Ratul, N. Chowdhury, H. Soliman, M. S. Chaity, andA. Haque. Android malware detection in large dataset: smart approach. In Feb. 2020.
- A. Kapravelos, C. Grier, N. Chachra, C. Kruegel, G. Vigna, and V. Paxson. Hulk: eliciting malicious behavior in browser extensions. In 23rd USENIX Security Symposium (USENIX Security 14), San Diego, CA. USENIX Association, Aug. 2014.
- M. N.-U.-R. Chowdhury, Q. E. Alahy, and H. Soliman. Advanced android malware detection utilizing api calls and permissions. In H. Kim and K. J. Kim, editors, IT Conver- gence and Security, Singapore. Springer Singapore, 2021.
- Q. E. A. Ratul, N. Chowdhury, H. Soliman, M. S. Chaity, and A. Haque. Android malware detection in large dataset: smart approach. In Feb. 2020.
- L. Breiman. Random forests. Machine learning, 45(1), 2001.
- I. Jenhani, N. B. Amor, and Z. Elouedi. Decision trees as possibilistic classifiers. International Journal of Approximate Reasoning, 48(3), 2008. Special Section on Choquet Integra- tion in honor of Gustave Choquet (1915–2006) and Special Section on Nonmonotonic and Uncertain Reasoning.
- M. Bala, V. Athira, and A. Rajendran. Efficient multi-level lung cancer prediction model using support vector machine classifier. IOP Conference Series: Materials Science and Engineering, 1012, Jan. 2021.
- P. Tsangaratos and I. Ilia. Comparison of a logistic regression and naive bayes classifier in landslide susceptibility assessments: the influence of model’s complexity and training dataset size. Catena, 145, 2016.
- Declare permissions - Chrome Developers — developer.chrome.com. https : / / developer . chrome . com / docs / extensions / mv3 / declare permissions/. [Accessed 24-Aug- 2022].
- Permissions requested by apps and extensions - Chrome Web Store Help — support.google.com. https : / / support . google . com/chrome webstore/answer/186213?hl=en#zippy=% 2Chigh-alert%2Cmedium-alert. [Accessed 24-Aug-2022].
- Exploring the Benefits of Reinforcement Learning for Autonomous Drone Navigation and Control
Abstract Views :91 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, New Mexico Tech, US
1 Department of Computer Science, New Mexico Tech, US
Source
International Journal of Advanced Networking and Applications, Vol 15, No 1 (2023), Pagination: 5808-5814Abstract
Drones are now used in a wide range of industries, including delivery services and agriculture. Notwithstanding, controlling robots in powerful conditions can be testing, particularly while performing complex assignments. Conventional strategies for drone mechanization depend on pre-customized directions, restricting their adaptability and versatility. Drones can learn from their interactions with their environment and improve their performance over time with the help of reinforcement learning (RL), which has emerged as a promising method for drone automation in recent years. This paper looks at how RL can be used to automate drones and how it can be used in different industries. In addition, the difficulties of RL-based drone automation and potential directions for future research are discussed in the paper.Keywords
Reinforcement Learning, Drone Automation, Machine Learning, Navigation, Obstacle Avoidance, Object Tracking, Safety, Reliability, Training Data, Dynamic Environments, Decision-Making.References
- https://en.wikipedia.org/wiki/Pac-Man
- Y. Song, M. Steinweg, E. Kaufmann and D. Scaramuzza, "Autonomous Drone Racing with Deep Reinforcement Learning," 2021 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), Prague, Czech Republic, 2021,pp.1205-1212,doi: 10.1109/IROS51168.2021.9636053.
- A. Devo, J. Mao, G. Costante and G. Loianno, "Autonomous Single-Image Drone Exploration With Deep Reinforcement Learning and Mixed Reality," in IEEE Robotics and Automation Letters, vol. 7, no. 2, pp. 5031-5038, April 2022, doi: 10.1109/LRA.2022.3154019.
- D. Wang, T. Fan, T. Han and J. Pan, "A Two-Stage Reinforcement Learning Approach for Multi-UAV Collision Avoidance Under Imperfect Sensing," in IEEE Robotics and Automation Letters, vol. 5, no. 2, pp. 3098-3105, April 2020, doi: 10.1109/LRA.2020.2974648.
- V. N. Nguyen, R. Jenssen and D. Roverso, "Intelligent Monitoring and Inspection of Power Line Components Powered by UAVs and Deep Learning," in IEEE Power and Energy Technology Systems Journal, vol. 6, no. 1, pp. 11-21, March 2019, doi: 10.1109/JPETS.2018.2881429.
- W. Wu, M. A. Qurishee, J. Owino, I. Fomunung, M. Onyango and B. Atolagbe, "Coupling Deep Learning and UAV for Infrastructure Condition Assessment Automation," 2018 IEEE International Smart Cities Conference (ISC2), Kansas City, MO, USA, 2018, pp. 1-7, doi: 10.1109/ISC2.2018.8656971.
- N. Imanberdiyev, C. Fu, E. Kayacan and I. -M. Chen, "Autonomous navigation of UAV by using real-time model-based reinforcement learning," 2016 14th International Conference on Control, Automation, Robotics and Vision (ICARCV), Phuket, Thailand, 2016, pp. 1-6, doi: 10.1109/ICARCV.2016.7838739.
- C. Wu et al., "UAV Autonomous Target Search Based on Deep Reinforcement Learning in Complex Disaster Scene," in IEEE Access, vol. 7, pp. 117227-117245, 2019, doi: 10.1109/ACCESS.2019.2933002.
- F. Fei, Z. Tu, D. Xu and X. Deng, "Learn-to-Recover: Retrofitting UAVs with Reinforcement LearningAssisted Flight Control Under Cyber-Physical Attacks," 2020 IEEE International Conference on Robotics and Automation (ICRA), Paris, France, 2020, pp. 7358-7364, doi: 10.1109/ICRA40945.2020.9196611.
- A. Gumaei et al., "Deep Learning and Blockchain with Edge Computing for 5G-Enabled Drone Identification and Flight Mode Detection," in IEEE Network, vol. 35, no. 1, pp. 94-100, January/February 2021, doi: 10.1109/MNET.011.2000204.
- E. Bøhn, E. M. Coates, S. Moe and T. A. Johansen, "Deep Reinforcement Learning Attitude Control of Fixed-Wing UAVs Using Proximal Policy optimization," 2019 International Conference on Unmanned Aircraft Systems (ICUAS), Atlanta, GA, USA, 2019, pp. 523-533, doi: 10.1109/ICUAS.2019.8798254.
- H. X. Pham, H. M. La, D. Feil-Seifer and L. Van Nguyen, "Reinforcement Learning for Autonomous UAV Navigation Using Function Approximation," 2018 IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR), Philadelphia, PA, USA, 2018, pp. 1-6, doi: 10.1109/SSRR.2018.8468611.
- H. Lu, Y. Li, S. Mu, D. Wang, H. Kim and S. Serikawa, "Motor Anomaly Detection for Unmanned Aerial Vehicles Using Reinforcement Learning," in IEEE Internet of Things Journal, vol. 5, no. 4, pp. 2315-2322, Aug. 2018, doi: 10.1109/JIOT.2017.2737479.
- C. Wang, J. Wang, J. Wang and X. Zhang, "Deep-Reinforcement-Learning-Based Autonomous UAV Navigation With Sparse Rewards," in IEEE Internet of Things Journal, vol. 7, no. 7, pp. 6180-6190, July 2020, doi: 10.1109/JIOT.2020.2973193.
- Subbarayalu, Venkatraman, and Maria Anu Vensuslaus. "An Intrusion Detection System for Drone Swarming Utilizing Timed Probabilistic Automata." Drones 7, no. 4 (2023): 248.
- Moon, S. Papaioannou, C. Laoudias, P. Kolios and S. Kim, "Deep Reinforcement Learning Multi-UAV Trajectory Control for Target Tracking," in IEEE Internet of Things Journal, vol. 8, no. 20, pp. 15441-15455, 15 Oct.15, 2021, doi: 10.1109/JIOT.2021.3073973.
- K. Li, W. Ni and F. Dressler, "LSTM-Characterized Deep Reinforcement Learning for Continuous Flight Control and Resource Allocation in UAV-Assisted Sensor Network," in IEEE Internet of Things Journal, vol. 9, no. 6, pp. 4179-4189, 15 March15, 2022, doi: 10.1109/JIOT.2021.3102831.
- K. Li, W. Ni, E. Tovar and M. Guizani, "Joint Flight Cruise Control and Data Collection in UAV-Aided Internet of Things: An Onboard Deep Reinforcement Learning Approach," in IEEE Internet of Things Journal, vol. 8, no. 12, pp. 9787-9799, 15 June15, 2021, doi: 10.1109/JIOT.2020.3019186.
- M. Z. Anwar, Z. Kaleem and A. Jamalipour, "Machine Learning Inspired Sound-Based Amateur Drone Detection for Public Safety Applications," in IEEE Transactions on Vehicular Technology, vol. 68, no. 3, pp. 2526-2534, March 2019, doi: 10.1109/TVT.2019.2893615.
- D. Chen, Q. Qi, Z. Zhuang, J. Wang, J. Liao and Z. Han, "Mean Field Deep Reinforcement Learning for Fair and Efficient UAV Control," in IEEE Internet of Things Journal, vol. 8, no. 2, pp. 813-828, 15 Jan.15, 2021, doi: 10.1109/JIOT.2020.3008299.
- P. Luong, F. Gagnon, L. -N. Tran and F. Labeau, "Deep Reinforcement Learning-Based Resource Allocation in Cooperative UAV -Assisted Wireless Networks," in IEEE Transactions on Wireless Communications, vol. 20, no. 11, pp. 7610 -7625, Nov. 2021, doi: 10.1109/TWC.2021.3086503.
- L. Li, Q. Cheng, K. Xue, C. Yang and Z. Han, "Downlink Transmit Power Control in Ultra -Dense UAV Network Based on Mean Field Game and Deep Reinforcement Learning," in IEEE Transactions on Vehicular Technology, vol. 69, no. 12, pp. 15594 - 15605, Dec. 2020, doi: 10.1109/TVT.2020.3043851.
- M. Ezuma, F. Erden, C. K. Anjinappa, O. Ozdemir and I. Guvenc, "Micro -UAV Detection and Classification from RF Fingerprints Using Machine Learning Techniques," 2019 IEEE Aerospace Conference, Big Sky, MT, USA, 2019, pp. 1 -13, doi: 10.1109/AERO.2019.8741970.
- J. Yao and N. Ansari, "Wireless Power and Energy Harvesting Control in IoD by Deep Reinforcement Learning," in IEEE Transactions on Green Communications and Networking, vol. 5, no. 2, pp. 980 -989, June 2021, doi: 10.1109/TGCN.2021.3049500.
- H. Bou -Ammar, H. Voos and W. Ertel, "Controller design for quadrotor UAVs using reinforcement learning," 2010 IEEE International Conference on Control Applications, Yokohama, Japan, 2010, pp. 2130 -2135, doi: 10.1109/CCA.2010.5611206.
- H. Peng and X. Shen, "Multi -Agent Reinforcement Learning Based Resource Management in MEC - and UAV -Assisted Vehicular Networks," in IEEE Journal on Selected Areas in Communications, vol. 39, no. 1, pp. 131 -141, Jan. 2021, doi: 10.1109/JSAC.2020.3036962.
- Hossen, Mohammad Sahinur; Islam, Rakibul; Chowdhury, M.NUR.; Haque, Ahshanul; Alahy, Q.E. (2023). Malware Detection in Web Browser Plugins Using API Calls with Permissions, International Journal of Advanced Networking and Applications - IJANA, DOI: 10.35444/IJANA.2023.14603
- Islam, Jahirul; Hasan, Mahadi; Hasan, Md Maruf (2023): Securing the Edge: A Comprehensive Review to Protecting Wireless Sensor Networks and Android Devices from Cyber Attacks. TechRxiv. Preprint. https://doi.org/10.36227/techrxiv.22776035.v1
- Rani, Sangeeta & Dhindsa, Kanwalvir. (2018). Android Malware Detection in Official and Third - Party Application Stores. Int. J. Advanced Networking and Applications. 9. 3506 -3509.