Protecting Android Devices From Malware Attacks: A State-of-the-Art Report of Concepts, Modern Learning Models and Challenges

被引:1
作者
Bayazit, Esra Calik [1 ]
Sahingoz, Ozgur Koray [2 ]
Dogan, Buket [3 ]
机构
[1] Fatih Sultan Mehmet Vakif Univ, Dept Comp Engn, TR-34445 Beyoglu, Istanbul, Turkiye
[2] Biruni Univ, Dept Comp Engn, TR-34093 Istanbul, Turkiye
[3] Marmara Univ, Fac Technol, Dept Comp Engn, TR-34854 Istanbul, Turkiye
关键词
Android; deep learning; malware detection system; malware analysis; machine learning; HYBRID ANALYSIS; NEURAL-NETWORK;
D O I
10.1109/ACCESS.2023.3323396
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advancements in microelectronics have increased the popularity of mobile devices like cellphones, tablets, e-readers, and PDAs. Android, with its open-source platform, broad device support, customizability, and integration with the Google ecosystem, has become the leading operating system for mobile devices. While Android's openness brings benefits, it has downsides like a lack of official support, fragmentation, complexity, and security risks if not maintained. Malware exploits these vulnerabilities for unauthorized actions and data theft. To enhance device security, static and dynamic analysis techniques can be employed. However, current attackers are becoming increasingly sophisticated, and they are employing packaging, code obfuscation, and encryption techniques to evade detection models. Researchers prefer flexible artificial intelligence methods, particularly deep learning models, for detecting and classifying malware on Android systems. In this survey study, a detailed literature review was conducted to investigate and analyze how deep learning approaches have been applied to malware detection on Android systems. The study also provides an overview of the Android architecture, datasets used for deep learning-based detection, and open issues that will be studied in the future.
引用
收藏
页码:123314 / 123334
页数:21
相关论文
共 113 条
[1]   An Android-based Trojan Spyware to Study the NotificationListener Service Vulnerability [J].
Abualola, Huda ;
Alhawai, Hessa ;
Kadadha, Maha ;
Otrok, Hadi ;
Mourad, Azzam .
7TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2016) / THE 6TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2016) / AFFILIATED WORKSHOPS, 2016, 83 :465-471
[2]   ShielDroid: A Hybrid Approach Integrating Machine and Deep Learning for Android Malware Detection [J].
Ahmed, Md Faisal ;
Biash, Zarin Tasnim ;
Shakil, Abu Raihan ;
Ryen, Ahmed Ann Noor ;
Hossain, Arman ;
Bin Ashraf, Faisal ;
Hossain, Muhammad Iqbal .
2022 INTERNATIONAL CONFERENCE ON DECISION AID SCIENCES AND APPLICATIONS (DASA), 2022, :911-916
[3]   An Ensemble-Based Parallel Deep Learning Classifier With PSO-BP Optimization for Malware Detection [J].
Al-Andoli, Mohammed Nasser ;
Sim, Kok Swee ;
Tan, Shing Chiang ;
Goh, Pey Yun ;
Lim, Chee Peng .
IEEE ACCESS, 2023, 11 :76330-76346
[4]   Toward a more dependable hybrid analysis of android malware using aspect-oriented programming [J].
Ali-Gombe, Aisha I. ;
Saltaformaggio, Brendan ;
Ramanujam, J. Ram ;
Xu, Dongyan ;
Richard, Golden G., III .
COMPUTERS & SECURITY, 2018, 73 :235-248
[5]  
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1109/MSR.2016.056, 10.1145/2901739.2903508]
[6]   An Automated Vision-Based Deep Learning Model for Efficient Detection of Android Malware Attacks [J].
Almomani, Iman ;
Alkhayer, Aala ;
El-Shafai, Walid .
IEEE ACCESS, 2022, 10 :2700-2720
[7]   Applications of Artificial Intelligence to Detect Android Botnets: A Survey [J].
Almuhaideb, Abdullah M. ;
Alynanbaawi, Dalal Y. .
IEEE ACCESS, 2022, 10 :71737-71748
[8]   Identifying Malicious Software Using Deep Residual Long-Short Term Memory [J].
Alotaibi, Aziz .
IEEE ACCESS, 2019, 7 :163128-163137
[9]   Robust deep learning early alarm prediction model based on the behavioural smell for android malware [J].
Amer, Eslam ;
El-Sappagh, Shaker .
COMPUTERS & SECURITY, 2022, 116
[10]   A Multi-Perspective malware detection approach through behavioral fusion of API call sequence [J].
Amer, Eslam ;
Zelinka, Ivan ;
El-Sappagh, Shaker .
COMPUTERS & SECURITY, 2021, 110