A Survey on Android Malware Detection Techniques Using Supervised Machine Learning

被引:1
作者
Altaha, Safa J. [1 ]
Aljughaiman, Ahmed [1 ]
Gul, Sonia [1 ]
机构
[1] King Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Networks & Commun, Al Hasa 31982, Saudi Arabia
关键词
Malware; Smart phones; Operating systems; Trojan horses; Security; Libraries; Codes; Ransomware; User interfaces; Surveys; Android; Android malware; malware detection; supervised machine learning; FEATURES;
D O I
10.1109/ACCESS.2024.3485706
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Android's open-source nature has contributed to the platform's rapid growth and its widespread adoption. However, this widespread adoption of the Android operating system (OS) has also attracted the attention of malicious actors who develop malware targeting these devices. Android malware threatens users' privacy, data security, and overall device performance. Machine learning (ML) plays a significant role in malware analysis and detection because it can process huge amounts of data, identify complex patterns, and adjust to changing threats. The purpose of this paper is to provide a comprehensive review of the existing research on ML-based techniques used to detect and analyze Android malware. In this paper, the security weaknesses in Android OS are explored and the reasons why these weaknesses do not exist in the iPhone operating system (iOS) are discussed. Further, the authors examine the existing studies that have been proposed by researchers and outlines their strengths and limitations. The findings reveal that the existing researches utilize different ML models, features, and detection techniques, including static, dynamic, and hybrid approaches. Moreover, directions for future research and potential areas that require more attention and improvement in this field are highlighted.
引用
收藏
页码:173168 / 173191
页数:24
相关论文
共 100 条
[11]  
Chowdhury N.-U.-R., Haque A., Soliman H., Hossen M.S., Fatima T., Ahmed I., Android malware detection using machine learning: A review, Proc. Intell. Syst. Conf. Amsterdam, pp. 507-522, (2023)
[12]  
Wang Z., Liu Q., Chi Y., Review of Android malware detection based on deep learning, IEEE Access, 8, pp. 181102-181126, (2020)
[13]  
Kouliaridis V., Kambourakis G., A comprehensive survey on machine learning techniques for Android malware detection, Information, 12, 5, (2021)
[14]  
Senanayake J., Kalutarage H., Al-Kadri M.O., Android mobile malware detection using machine learning: A systematic review, Electronics, 10, 13, (2021)
[15]  
Haris M., Jadoon B., Yousaf M., Khan F., Evolution of Android operating system: A review, Proc. 2nd Int. Conf. Adv. Res., pp. 1-11, (2017)
[16]  
Sain R., Android OS History and Versions, (2024)
[17]  
Vaidya R., Android Architecture: Layers and Important Components, (2023)
[18]  
Rahimi N., Nolen J., Gupta B., Android security and its rooting—A possible improvement of its security architecture, J. Inf. Secur., 10, 2, pp. 91-102, (2019)
[19]  
Chen Y., Research on Android architecture and application development, J. Phys., Conf. Ser., 1992, 2, (2021)
[20]  
Uttarwar P., Tidke R.P., Dandwate D.S., Tupe U.J., A literature review on Android—A mobile operating system, Int. Res. J. Eng. Technol., 8, 1, pp. 1-6, (2021)