A Survey on Android Malware Detection Techniques Using Supervised Machine Learning

被引:1
作者
Altaha, Safa J. [1 ]
Aljughaiman, Ahmed [1 ]
Gul, Sonia [1 ]
机构
[1] King Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Networks & Commun, Al Hasa 31982, Saudi Arabia
关键词
Malware; Smart phones; Operating systems; Trojan horses; Security; Libraries; Codes; Ransomware; User interfaces; Surveys; Android; Android malware; malware detection; supervised machine learning; FEATURES;
D O I
10.1109/ACCESS.2024.3485706
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Android's open-source nature has contributed to the platform's rapid growth and its widespread adoption. However, this widespread adoption of the Android operating system (OS) has also attracted the attention of malicious actors who develop malware targeting these devices. Android malware threatens users' privacy, data security, and overall device performance. Machine learning (ML) plays a significant role in malware analysis and detection because it can process huge amounts of data, identify complex patterns, and adjust to changing threats. The purpose of this paper is to provide a comprehensive review of the existing research on ML-based techniques used to detect and analyze Android malware. In this paper, the security weaknesses in Android OS are explored and the reasons why these weaknesses do not exist in the iPhone operating system (iOS) are discussed. Further, the authors examine the existing studies that have been proposed by researchers and outlines their strengths and limitations. The findings reveal that the existing researches utilize different ML models, features, and detection techniques, including static, dynamic, and hybrid approaches. Moreover, directions for future research and potential areas that require more attention and improvement in this field are highlighted.
引用
收藏
页码:173168 / 173191
页数:24
相关论文
共 100 条
[1]  
Abuthawabeh M.K.A., Android malware detection based on network traffic using CICAndMal2017 dataset, (2019)
[2]  
Garg S., Baliyan N., Comparative analysis of Android and iOS from security viewpoint, Comput. Sci. Rev., 40, (2021)
[3]  
Yilmaz A.B., Taspinar Y.S., Koklu M., Classification of malicious Android applications using naive Bayes and support vector machine algorithms, Int. J. Intell. Syst. Appl. Eng., 10, 2, pp. 269-274, (2022)
[4]  
Aslan O.A., Samet R., A comprehensive review on malware detection approaches, IEEE Access, 8, pp. 6249-6271, (2020)
[5]  
Saeed I.A., Selamat A., Abuagoub A.M.A., A survey on malware and malware detection systems, Int. J. Comput. Appl., 67, 16, pp. 25-31, (2013)
[6]  
Tahir R., A study on malware and malware detection techniques, Int. J. Educ. Manage. Eng., 8, 2, pp. 20-30, (2018)
[7]  
Sharma A., Sahay S.K., Evolution and detection of polymorphic and metamorphic malwares: A survey, (2014)
[8]  
Vinod P., Jaipur R., Laxmi V., Gaur M., Survey on malware detection methods, Proc. 3rd Hackers’ Workshop Comput. Internet Secur. (IITKHACK), pp. 74-79, (2009)
[9]  
Milosevic N., Dehghantanha A., Choo K.-K.-R., Machine learning aided Android malware classification, Comput. Electr. Eng., 61, pp. 266-274, (2017)
[10]  
Pan Y., Ge X., Fang C., Fan Y., A systematic literature review of Android malware detection using static analysis, IEEE Access, 8, pp. 116363-116379, (2020)