Show simple item record

dc.contributor.advisorHossain, Muhammad Iqbal
dc.contributor.advisorAshraf, Faisal Bin
dc.contributor.authorAhmed, Md Faisal
dc.contributor.authorBiash, Zarin Tasnim
dc.contributor.authorShakil, Abu Raihan
dc.contributor.authorRyen, Ahmed Ann Noor
dc.contributor.authorHossain, Arman
dc.date.accessioned2021-10-26T06:28:41Z
dc.date.available2021-10-26T06:28:41Z
dc.date.copyright2021
dc.date.issued2021-09
dc.identifier.otherID 21341042
dc.identifier.otherID 18141008
dc.identifier.otherID 18101632
dc.identifier.otherID 18101583
dc.identifier.otherID 18101707
dc.identifier.urihttp://hdl.handle.net/10361/15550
dc.descriptionThis thesis is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science and Engineering, 2021.en_US
dc.descriptionCataloged from PDF version of thesis.
dc.descriptionIncludes bibliographical references (pages 40-41).
dc.description.abstractDue to the rapid development of the advanced world of technology, there is a high increase in devices such as smartphones and tablets, which increase the number of applications used. Though an application has to pass the malware detection test before appearing in the play store, many applications successfully get trusted and accepted even though they contain malicious software variants that are challenging to detect. The application requires physical execution to see these malicious contents, which get undetected during the rst screening test. Due to the physical implementation of the application, it may be too late to undo the malware's damage. In this work, the usage of real-time Android malware detection analyzing Android applications to detect and swiftly distinguish complex malware has been discussed. This work focuses on the use of dynamic algorithms implemented by hybrid detection techniques of Android malware. After ltrating the collected dataset, the process of separation between harmful and benign apps is discussed. Then summarization and evaluation of the various techniques and classi cation algorithms employed have been discussed, identifying the best-suited method that gives the most accurate result in a minimum amount of time. The best way to reach the target is a hybrid Random Forest, and Multilayer perceptron network, where the overall accuracy achieved was 97.5% with an execution time of 22.945 seconds. An Android application, namely,\Shield: Malware Scanner", was developed using Java in determining if malware is present in an application. If there is any malware, it detects the type of malware and advises the user on securing their data and privacy and recovering from it.en_US
dc.description.statementofresponsibilityMd Faisal Ahmed
dc.description.statementofresponsibilityZarin Tasnim Biash
dc.description.statementofresponsibilityAbu Raihan Shakil
dc.description.statementofresponsibilityAhmed Ann Noor Ryen
dc.description.statementofresponsibilityArman Hossain
dc.format.extent41 pages
dc.language.isoenen_US
dc.publisherBrac Universityen_US
dc.rightsBrac University theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission.
dc.subjectMalware analysisen_US
dc.subjectCyber-securityen_US
dc.subjectMalware detectionen_US
dc.subjectReal-time analysisen_US
dc.subjectAndroid application Neural networken_US
dc.subject.lcshComputer security
dc.subject.lcshMalware (Computer software)
dc.subject.lcshMachine learning
dc.subject.lcshApplication software--Development
dc.subject.lcshMobile computing
dc.titleShielDroid: a hybrid ML and DL approach for real-time malware detection system in Androiden_US
dc.typeThesisen_US
dc.contributor.departmentDepartment of Computer Science and Engineering, Brac University
dc.description.degreeB. Computer Science


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record