Android Mobile Malware Detection Using Machine Learning: A Systematic Review

被引:42
作者
Senanayake, Janaka [1 ]
Kalutarage, Harsha [1 ]
Al-Kadri, Mhd Omar [2 ]
机构
[1] Robert Gordon Univ, Sch Comp, Aberdeen AB10 7QB, Scotland
[2] Birmingham City Univ, Sch Comp & Digital Technol, Birmingham B4 7XG, W Midlands, England
关键词
Android security; malware detection; code vulnerability; machine learning; STATIC ANALYSIS; CODE; CLASSIFIER;
D O I
10.3390/electronics10131606
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing use of mobile devices, malware attacks are rising, especially on Android phones, which account for 72.2% of the total market share. Hackers try to attack smartphones with various methods such as credential theft, surveillance, and malicious advertising. Among numerous countermeasures, machine learning (ML)-based methods have proven to be an effective means of detecting these attacks, as they are able to derive a classifier from a set of training examples, thus eliminating the need for an explicit definition of the signatures when developing malware detectors. This paper provides a systematic review of ML-based Android malware detection techniques. It critically evaluates 106 carefully selected articles and highlights their strengths and weaknesses as well as potential improvements. Finally, the ML-based methods for detecting source code vulnerabilities are discussed, because it might be more difficult to add security after the app is deployed. Therefore, this paper aims to enable researchers to acquire in-depth knowledge in the field and to identify potential future research and development directions.
引用
收藏
页数:34
相关论文
共 107 条
[1]   Developers Need Support, Too: A Survey of Security Advice for Software Developers [J].
Acar, Yasemin ;
Stransky, Christian ;
Wermke, Dominik ;
Weir, Charles ;
Mazurek, Michelle L. ;
Fahl, Sascha .
2017 IEEE CYBERSECURITY DEVELOPMENT (SECDEV), 2017, :22-26
[2]   An efficient reinforcement learning-based Botnet detection approach [J].
Alauthman, Mohammad ;
Aslam, Nauman ;
Al-kasassbeh, Mouhammd ;
Khan, Suleman ;
Al-Qerem, Ahmad ;
Choo, Kim-Kwang Raymond .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 150
[3]  
Alenezi Mamdouh, 2018, 5th International Symposium on Data Mining Applications. Advances in Intelligent Systems and Computing (AISC 753), P84, DOI 10.1007/978-3-319-78753-4_8
[4]  
Alqahtani EJ, 2019, 2019 SIXTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), P110, DOI [10.1109/SDS.2019.8768729, 10.1109/sds.2019.8768729]
[5]   DL-Droid: Deep learning based android malware detection using real devices [J].
Alzaylaee, Mohammed K. ;
Yerima, Suleiman Y. ;
Sezer, Sakir .
COMPUTERS & SECURITY, 2020, 89
[6]   AndroShield: Automated Android Applications Vulnerability Detection, a Hybrid Static and Dynamic Analysis Approach [J].
Amin, Amr ;
Eldessouki, Amgad ;
Magdy, Menna Tullah ;
Abdeen, Nouran ;
Hindy, Hanan ;
Hegazy, Islam .
INFORMATION, 2019, 10 (10)
[7]   Static malware detection and attribution in android byte-code through an end-to-end deep system [J].
Amin, Muhammad ;
Tanveer, Tamleek Ali ;
Tehseen, Mohammad ;
Khan, Murad ;
Khan, Fakhri Alam ;
Anwar, Sajid .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 102 :112-126
[8]   Android malware detection through generative adversarial networks [J].
Amin, Muhammad ;
Shah, Babar ;
Sharif, Aizaz ;
Alit, Tamleek ;
Kim, Ki-Il ;
Anwar, Sajid .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (02)
[9]  
[Anonymous], 2013, P 3 ACM WORKSH SEC P
[10]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,