Androanalyzer: Android Malicious Software Detection Based on Deep Learning

18Citations
Citations of this article
39Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Background: Technological developments have a significant effect on the development of smart devices. The use of smart devices has become widespread due to their extensive capabilities. The Android operating system is preferred in smart devices due to its open-source structure. This is the reason for its being the target of malware. The advancements in Android malware hiding and detection avoidance methods have overridden traditional malware detection methods. Methods: In this study, a model employing AndroAnalyzer that uses static analysis and deep learning system is proposed. Tests were carried out with an original dataset consisting of 7,622 applications. Additional tests were conducted with machine learning techniques to compare it with the deep learning method using the obtained feature vector. Results: Accuracy of 98.16% was achieved by presenting a better performance compared to traditional machine learning techniques. Values of recall, precision, and F-measure were 98.78, 99.24 and 98.90, respectively. The results showed that deep learning models using trace-based feature vectors outperform current cutting-edge technology approaches.

Cite

CITATION STYLE

APA

Arslan, R. S. (2021). Androanalyzer: Android Malicious Software Detection Based on Deep Learning. PeerJ Computer Science, 7, 1–20. https://doi.org/10.7717/PEERJ-CS.533

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free