Publications by authors named "Nurbol Luktarhan"

The smartphone has become an indispensable tool in our daily lives, and the Android operating system is widely installed on our smartphones. This makes Android smartphones a prime target for malware. In order to address threats posed by malware, many researchers have proposed different malware detection approaches, including using a function call graph (FCG).

View Article and Find Full Text PDF

System logs are a crucial component of system maintainability, as they record the status of the system and essential events for troubleshooting and maintenance when necessary. Therefore, anomaly detection of system logs is crucial. Recent research has focused on extracting semantic information from unstructured log messages for log anomaly detection tasks.

View Article and Find Full Text PDF
Article Synopsis
  • Traffic classification is crucial for detecting network anomalies and enhancing security, but current methods face challenges with feature design and data set limitations.
  • The proposed BERT-based Time-Series Feature Network (TSFN) model incorporates both global and time-series features by using a BERT packet encoder and an LSTM module for improved accuracy.
  • Testing the TSFN on the USTC-TFC dataset achieved an impressive F1 score of 99.50%, demonstrating the effectiveness of considering time-series features in malicious traffic classification.
View Article and Find Full Text PDF

Enterprise systems typically produce a large number of logs to record runtime states and important events. Log anomaly detection is efficient for business management and system maintenance. Most existing log-based anomaly detection methods use log parser to get log event indexes or event templates and then utilize machine learning methods to detect anomalies.

View Article and Find Full Text PDF

With the popularity of Android, malware detection and family classification have also become a research focus. Many excellent methods have been proposed by previous authors, but static and dynamic analyses inevitably require complex processes. A hybrid analysis method for detecting Android malware and classifying malware families is presented in this paper, and is partially optimized for multiple-feature data.

View Article and Find Full Text PDF