Protectors of the Android Domain: Research into Mobile Malware Detection and Defense

Authors

  • B. Bhaskar Assistant Professor, Department of Computer Science and Engineering, Madanapalle Institute of Technology and Science, Madanapalle – 517325, INDIA
  • Sharanya S. Assistant Professor, Department of Data Science and Business Systems, SRM Institute of Science and Technology, Kattankulathur, Chennai-603203, INDIA
  • A. Bala Murali Assistant Professor, Department of Computer Science and Engineering, St. Joseph's Institute of Technology, OMR, Chennai-600119, INDIA
  • E. Archana Assistant Professor, Department of Computer Science and Engineering, Panimalar Engineering College, Chennai – 600123, INDIA
  • T. A. Mohanaprakash Associate Professor, Department of Computer Science and Engineering, Panimalar Engineering College, Chennai – 600123, INDIA

Keywords:

Android malware, Malware detection, Trojan horses, Ransom ware, supervised machine learning, Personal data security

Abstract

Due to the ever-increasing amount of malware that can be found on mobile devices, Android malware detection has become an essential topic of study. It starts with an overview of android malware, including its many subtypes such as Trojan horses, adware, spyware, and ransomware, as well as the procedures that must be taken to avoid having malware installed on your device. In order to detect malicious programs, it performs an analysis on a number of attributes that have been collected from the application package files and system call traces of the device. The suggested solution makes use of a neural network model that was educated using a dataset consisting of both safe and harmful apps. This problem is solved with the assistance of android malware detection with the use of machine learning. In order to determine whether or not the Android application file that was uploaded includes malware or can be used safely, the system that has been presented makes use of a method for supervised machine learning that is known as a Neural Network. It gives an overview of the numerous methods that may be used to identify android malware, such as detection based on signatures, detection based on behaviors, and detection based on machine learning. Mobile devices, especially smartphones powered by Android, have emerged as indispensable aids in our day-to-day activities. On the other hand, a growth in the usage of mobile devices has resulted in an increase in the number of cyber-attacks, with malware being a serious concern. Malware designed for Android devices presents a serious threat to users of mobile devices since it has the potential to steal personal data, disrupt device functionality, and jeopardize the security of the device. As a result, it is more important than ever to identify and eliminate malware on Android devices.

Downloads

Download data is not yet available.

References

V. Kouliaridis, K. Barmpatsalou, G. Kambourakis, and S. Chen, ‘‘A survey on mobile malware detection techniques,’’ IEICE Trans. Inf. Syst., vol.103, no. 2, pp. 204–211, Feb. 2020

Qamar, A. Karim, and V. Chang, ‘‘Mobile malware attacks: Review, taxonomy & future directions,’’ Future Gener. Comput. Syst., vol. 97, pp. 887–909, Aug. 2019.

E. J. Alqahtani, R. Zagrouba, and A. Almuhaideb, ‘‘A survey on Android malware detection techniques using machine learning algorithms,’’ in Proc. 6th Int. Conf. Softw. Defined Syst. (SDS), Rome, Italy, Jun. 2019, pp. 110–117.

H. Lubuva, Q. Huang, and G. C. Msonde, ‘‘A review of static malware detection for Android apps permission based on deep learning,’’ Int. J. Comput. Netw. Appl., vol. 6, no. 5,pp. 80–91, Sep./Oct. 2019.

P. Bhat and K. Dutta, ‘‘A survey on various threats and current state of security in Android platform,’’ ACM Comput. Surv., vol. 52, no. 1, p. 21, Feb. 2019.

M. Choudhary and B. Kishore, ‘‘HAAMD: Hybrid analysis for Android malwaredetection,’’ in Proc. Int. Conf. Comput. Commun. Informat. (ICCCI), Jan. 2018, pp. 1–4 [7]. D. BalaGanesh,

Chakrabarti, and D. Midhunchakkaravarthy, ‘‘Smart devicesthreats, vulnerabilities and malware detection approaches: A survey,’’ Eur. J. Eng. Res.Sci., vol. 3, no. 2, pp. 7–12, Feb. 2018.

P. Yan and Z. Yan, ‘‘A survey on dynamic mobile malware detection,’’Softw.Qual. J., vol. 26, no. 3, pp. 891–919, Sep. 2018.

K. Tam, A. Feizollah, N. B. Anuar, R. Salleh, and L. Cavallaro, ‘‘The evolution of Android malware and Android analysis techniques,’’ ACM Comput. Surv., vol. 49, no.4, p. 76, 2017.

S. K. Muttoo and S. Badhani, ‘‘Android malware detection: State of the art,’’ Int. J. Inf. Technol., vol. 9, no. 1, pp. 111–117, Mar. 2017.

Downloads

Published

25.12.2023

How to Cite

Bhaskar, B. ., S., S. ., Murali, A. B. ., Archana, E. ., & Mohanaprakash, T. A. . (2023). Protectors of the Android Domain: Research into Mobile Malware Detection and Defense. International Journal of Intelligent Systems and Applications in Engineering, 12(1), 639–646. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4161

Issue

Section

Research Article