Protectors of the Android Domain: Research into Mobile Malware Detection and Defense
Keywords:
Android malware, Malware detection, Trojan horses, Ransom ware, supervised machine learning, Personal data securityAbstract
Due to the ever-increasing amount of malware that can be found on mobile devices, Android malware detection has become an essential topic of study. It starts with an overview of android malware, including its many subtypes such as Trojan horses, adware, spyware, and ransomware, as well as the procedures that must be taken to avoid having malware installed on your device. In order to detect malicious programs, it performs an analysis on a number of attributes that have been collected from the application package files and system call traces of the device. The suggested solution makes use of a neural network model that was educated using a dataset consisting of both safe and harmful apps. This problem is solved with the assistance of android malware detection with the use of machine learning. In order to determine whether or not the Android application file that was uploaded includes malware or can be used safely, the system that has been presented makes use of a method for supervised machine learning that is known as a Neural Network. It gives an overview of the numerous methods that may be used to identify android malware, such as detection based on signatures, detection based on behaviors, and detection based on machine learning. Mobile devices, especially smartphones powered by Android, have emerged as indispensable aids in our day-to-day activities. On the other hand, a growth in the usage of mobile devices has resulted in an increase in the number of cyber-attacks, with malware being a serious concern. Malware designed for Android devices presents a serious threat to users of mobile devices since it has the potential to steal personal data, disrupt device functionality, and jeopardize the security of the device. As a result, it is more important than ever to identify and eliminate malware on Android devices.
Downloads
References
V. Kouliaridis, K. Barmpatsalou, G. Kambourakis, and S. Chen, ‘‘A survey on mobile malware detection techniques,’’ IEICE Trans. Inf. Syst., vol.103, no. 2, pp. 204–211, Feb. 2020
Qamar, A. Karim, and V. Chang, ‘‘Mobile malware attacks: Review, taxonomy & future directions,’’ Future Gener. Comput. Syst., vol. 97, pp. 887–909, Aug. 2019.
E. J. Alqahtani, R. Zagrouba, and A. Almuhaideb, ‘‘A survey on Android malware detection techniques using machine learning algorithms,’’ in Proc. 6th Int. Conf. Softw. Defined Syst. (SDS), Rome, Italy, Jun. 2019, pp. 110–117.
H. Lubuva, Q. Huang, and G. C. Msonde, ‘‘A review of static malware detection for Android apps permission based on deep learning,’’ Int. J. Comput. Netw. Appl., vol. 6, no. 5,pp. 80–91, Sep./Oct. 2019.
P. Bhat and K. Dutta, ‘‘A survey on various threats and current state of security in Android platform,’’ ACM Comput. Surv., vol. 52, no. 1, p. 21, Feb. 2019.
M. Choudhary and B. Kishore, ‘‘HAAMD: Hybrid analysis for Android malwaredetection,’’ in Proc. Int. Conf. Comput. Commun. Informat. (ICCCI), Jan. 2018, pp. 1–4 [7]. D. BalaGanesh,
Chakrabarti, and D. Midhunchakkaravarthy, ‘‘Smart devicesthreats, vulnerabilities and malware detection approaches: A survey,’’ Eur. J. Eng. Res.Sci., vol. 3, no. 2, pp. 7–12, Feb. 2018.
P. Yan and Z. Yan, ‘‘A survey on dynamic mobile malware detection,’’Softw.Qual. J., vol. 26, no. 3, pp. 891–919, Sep. 2018.
K. Tam, A. Feizollah, N. B. Anuar, R. Salleh, and L. Cavallaro, ‘‘The evolution of Android malware and Android analysis techniques,’’ ACM Comput. Surv., vol. 49, no.4, p. 76, 2017.
S. K. Muttoo and S. Badhani, ‘‘Android malware detection: State of the art,’’ Int. J. Inf. Technol., vol. 9, no. 1, pp. 111–117, Mar. 2017.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.