University of Bahrain
Scientific Journals

Static, Dynamic and Intrinsic Feature Based Android Malware Detection Using Machine Learning: A Technical Review

Show simple item record

dc.contributor.author Ahmad Mantoo, Bilal
dc.contributor.author Ali Khan N, Zafar
dc.date.accessioned 2024-04-24T16:03:23Z
dc.date.available 2024-04-24T16:03:23Z
dc.date.issued 2024-04-24
dc.identifier.issn 2210-142X
dc.identifier.uri https://journal.uob.edu.bh:443/handle/123456789/5608
dc.description.abstract The emergence of smart devices in the market leads to exponential growth of malware in the market posing a significant challenge to smart device users. These malicious programs are designed with advanced techniques to evade existing detection techniques, infiltrate systems, and cause harm to any platform. One such platform is Android, the open-source smartphone operating system which has experienced exponential growth since its inception. However, this progress has been increased by the growing threat of Android malware, which exploits smartphones to carry out malicious acts. These malware employs a plethora of techniques to circumvent detection systems, presenting novel obstacles to reliable detection. Currently, Android malware detection approaches can be broadly classified into two categories, signature- based detection and machine learning-based detection. Signature-based detection relies on patterns or signatures of malware to identify and block malicious software. Nevertheless, this approach is subject to limitations, as it inadequately detects novel or un- known malware variants. To address the limitations of signature-based detection, researchers and antimalware firms have turned to machine learning-based detection techniques. These methods harness the power of machine learning algorithms to analyze and categorize applications based on their behavioral patterns, intrinsic features, or other distinctive characteristics. By assimilating knowledge from extensive datasets comprising known malware and legitimate applications, machine learning models can identify previously unseen malware by identifying similarities to known malevolent behavior. This study aims to disseminate the current landscape of machine learning-based Android malware detection techniques and undertake a parametric comparison of their efficacy. The objective is to explore a large number of detection methods and elucidate prospective avenues in this domain. By scrutinizing and contrasting these approaches, we can gain profound insights into the strengths and limitations of various machine learning techniques, while identifying potential areas for further research and enhancement. en_US
dc.language.iso en en_US
dc.publisher University of Bahrain en_US
dc.subject Malicious Programs, Android, Malware, Signature Based Detection, Machine Learning, Behavioral Patterns. en_US
dc.title Static, Dynamic and Intrinsic Feature Based Android Malware Detection Using Machine Learning: A Technical Review en_US
dc.identifier.doi http://dx.doi.org/10.12785/ijcds/XXXXXX
dc.volume 16 en_US
dc.issue 1 en_US
dc.pagestart 1 en_US
dc.pageend 13 en_US
dc.contributor.authorcountry India en_US
dc.contributor.authorcountry India en_US
dc.contributor.authoraffiliation Department of Computer Science and Engineering, Presidency University en_US
dc.contributor.authoraffiliation Department of Computer Science and Engineering, Presidency University en_US
dc.source.title International Journal of Computing and Digital Systems en_US
dc.abbreviatedsourcetitle IJCDS en_US


Files in this item

This item appears in the following Issue(s)

Show simple item record

All Journals


Advanced Search

Browse

Administrator Account