Loading...
Dr
Tarwireyi, Paul
Department: Computer Science
Research Interest(s): Information security, Machine learning, Computer networks, and Cloud computing.
Active Community Engagement: Institute of Electrical and Electronics Engineers (IEEE)
Institute of Information Technology Professionals South Africa (IITPSA)
South African Institute of Computer Scientists and Information Technologists (SAICSIT)
Biography: Paul Tarwireyi is a lecturer at the Department of Computer Science. He holds a Bachelor of Science, MSc from University of Fort Hare and his B.Sc. Honours Degree from Rhodes University. His research interests are in Information security, computer networks and Service Oriented Computing.
More Detail
4 results
Search Results
Now showing 1 - 4 of 4
- Detecting mobile Android malware is still a challenge, despite the numerous research efforts. This paper presents a static detection approach that employs music information retrieval techniques. Detection based on a single, or a few, acoustic features suffer from reduction in classification accuracy, due to the use of limited ‘views’. In this paper, we propose a multi-audio feature-fusion approach, which merges audio features of heterogeneous views in order to detect Android malware. Sixty-three standard audio signal processing features and thirty-nine biologically inspired audio features were extracted, after converting the Android application package files into waveform audio files. The biologically inspired features were derived from Mel-Frequency Cepstral Coefficients (MFCC), Gammatone Frequency Cepstral Coefficients (GFCC), and Bark Frequency Cepstral Coefficients (BFCC). Experimental results show that the proposed audio-based malware detection features are effective and need to be further studied. Using the traditional eXtreme Gradient Boosting machine learning algorithm on the CICMaldroid 2020 dataset, the proposed approach achieved accuracy, recall, f1-score, and AUC scores of 98.96%, 99.65%, 99.30% and 98.14% respectively. An average-precision (AP) score of 100% was also achieved.
- 1
- 4
- 0
- Android has grown to become the leading mobile operating system on the market due, in part, to its popularity and open-source nature. On the other hand, the Android ecosystem has become a fertile ground for malware, posing substantial security risks to ordinary mobile users. This is hardly surprising given the sheer number of devices it controls. Despite several research efforts over the years, Android malware detection remains a challenge. This is largely due to the fact that it is still unknown which features or combination of features can effectively distinguish malicious Android applications from benign ones. To this end, this research explores an Android malware detection system that uses the low-level audio Normalized Gammachirp Cepstral Coefficients as features to classify malware with machine learning techniques. First, we convert the Android Application Package datasets into audio datasets, then extract the audio features. To evaluate our approach, twenty-four machine learning algorithms were implemented, and results were collected. The experimental results show that the proposed malware features achieved the highest accuracy, precision, recall, f1-score and AUC and with respective values of 97.6%, 98.3%, 98.6%, 98.4% and 96.4%%. It also achieved 98% area under the precision-recall curve indicating that Normalized Gammachirp Cepstral Coefficients are effective for Android malware classification. Moreover, the processing and detection times were also reasonably short. Amongst the best-performing models were Extratrees, Random forest, CatBoost, XGBoost and KNeighbors.
- 1
- 1
- 0
- Since their inaugural releases in 2007, Google’s Android and Apple’s iOS have grown to dominate the mobile OS market share. Currently, they jointly possess over 99% of the global market share with Android being the leading mobile Operating System of choice worldwide, controlling close to 70% of the market share. Mobile devices have enabled the exponential growth of a plethora of mobile applications that play key roles in enabling many use cases that are pivotal in our daily lives. On the other hand, access to a large pool of potential end users is available to both legitimate and nefarious applications, thus making mobile devices a burgeoning target of malicious applications. Current malware detection solutions rely on tedious, time-consuming, knowledge-based, and manual processes to identify malware. This paper introduces BarkDroid, a novel Android malware detection technique that uses the low-level Bark Frequency Cepstral Coefficients audio features to detect malware. The initial results obtained show that Bark Frequency Cepstral Coefficient shave high discriminative capabilities to achieve accurate preditions. BarkDroid achieved 97.9% accuracy, 98.5% precision, an F1 score of 98.6%,and shorter execution times.
- 1
- 1
- 0
- 2022| MDPIThe Internet of Things (IoT) is changing the way consumers, businesses, and governments interact with the physical and cyber worlds. More often than not, IoT devices are designed for specific functional requirements or use cases without paying too much attention to security. Consequently, attackers usually compromise IoT devices with lax security to retrieve sensitive information such as encryption keys, user passwords, and sensitive URLs. Moreover, expanding IoT use cases and the exponential growth in connected smart devices significantly widen the attack surface. Despite efforts to deal with security problems, the security of IoT devices and the privacy of the data they collect and process are still areas of concern in research. Whenever vulnerabilities are discovered, device manufacturers are expected to release patches or new firmware to fix the vulnerabilities. There is a need to prioritize firmware attacks, because they enable the most high-impact threats that go beyond what is possible with traditional attacks. In IoT, delivering and deploying new firmware securely to affected devices remains a challenge. This study aims to develop a security model that employs Blockchain and the InterPlanentary File System (IPFS) to secure firmware transmission over a low data rate, constrained Long-Range Wide Area Network (LoRaWAN). The proposed security model ensures integrity, confidentiality, availability, and authentication and focuses on resource-constrained low-powered devices. To demonstrate the utility and applicability of the proposed model, a proof of concept was implemented and evaluated using low-powered devices. The experimental results show that the proposed model is feasible for constrained and low-powered LoRaWAN devices.
- 1
- 0
- 0