Cookie Policy Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management. - Human insight
Phone: (+39) 0813995453


Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management.

Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management.

Icon for Springer Related Articles

Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management.

J Med Syst. 2018 May 04;42(6):112

Authors: Firdaus A, Anuar NB, Razak MFA, Hashem IAT, Bachok S, Sangaiah AK

Abstract
The increasing demand for Android mobile devices and blockchain has motivated malware creators to develop mobile malware to compromise the blockchain. Although the blockchain is secure, attackers have managed to gain access into the blockchain as legal users, thereby comprising important and crucial information. Examples of mobile malware include root exploit, botnets, and Trojans and root exploit is one of the most dangerous malware. It compromises the operating system kernel in order to gain root privileges which are then used by attackers to bypass the security mechanisms, to gain complete control of the operating system, to install other possible types of malware to the devices, and finally, to steal victims' private keys linked to the blockchain. For the purpose of maximizing the security of the blockchain-based medical data management (BMDM), it is crucial to investigate the novel features and approaches contained in root exploit malware. This study proposes to use the bio-inspired method of practical swarm optimization (PSO) which automatically select the exclusive features that contain the novel android debug bridge (ADB). This study also adopts boosting (adaboost, realadaboost, logitboost, and multiboost) to enhance the machine learning prediction that detects unknown root exploit, and scrutinized three categories of features including (1) system command, (2) directory path and (3) code-based. The evaluation gathered from this study suggests a marked accuracy value of 93% with Logitboost in the simulation. Logitboost also helped to predicted all the root exploit samples in our developed system, the root exploit detection system (RODS).

PMID: 29728780 [PubMed - indexed for MEDLINE]

Powered by WPeMatico

P.IVA 08738511214
Privacy Policy
Cookie Policy
Termini e Condizioni

Sede Legale
Viale Campi Flegrei 55
80124 - Napoli

Sede Operativa
Via G.Porzio 4
Centro Direzionale G1
80143 - Napoli

© Copyright 2022 - Humaninsight Srls - All Rights Reserved
Privacy Policy | Cookie Policy | Termini e Condizioni
envelopephone-handsetmap-marker linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram