Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Malicious Applications Detection in Android using Machine Learning

View through CrossRef
A huge number of applications available for Android-based smartphone devices have emerged over the past years. Due to which a huge number of malicious applications has been growing explosively. Many approaches have been proposed to ensure the security and quality of application in the markets. Usually, Machine Learning approaches are utilized in the classification process of malicious application detection. Calculating accurate results of characterizing applications behaviors, or other features, has a direct effect on the results with Machine Learning calculations. Android applications emerge so quickly. The behavior of current applications has gotten progressively malicious. The extraction of malware-infected features from applications is thus become a difficult task. According to our knowledge, a ton of features have been extricated in existing work however no survey has overviewed the features built for identifying malicious applications efficiently. In this paper, we will in general give an extensive review of such sort of work that identifies feature applications by describing various practices of uses with various kinds of features. In this survey we have discussed the following dimensions: extraction and selection of feature methods if any, methods of detection and evaluation performed. In light of our review, we notice the issues of investigating malware-affected features from applications, give the scientific categorization and demonstrate the future headings.
Title: Malicious Applications Detection in Android using Machine Learning
Description:
A huge number of applications available for Android-based smartphone devices have emerged over the past years.
Due to which a huge number of malicious applications has been growing explosively.
Many approaches have been proposed to ensure the security and quality of application in the markets.
Usually, Machine Learning approaches are utilized in the classification process of malicious application detection.
Calculating accurate results of characterizing applications behaviors, or other features, has a direct effect on the results with Machine Learning calculations.
Android applications emerge so quickly.
The behavior of current applications has gotten progressively malicious.
The extraction of malware-infected features from applications is thus become a difficult task.
According to our knowledge, a ton of features have been extricated in existing work however no survey has overviewed the features built for identifying malicious applications efficiently.
In this paper, we will in general give an extensive review of such sort of work that identifies feature applications by describing various practices of uses with various kinds of features.
In this survey we have discussed the following dimensions: extraction and selection of feature methods if any, methods of detection and evaluation performed.
In light of our review, we notice the issues of investigating malware-affected features from applications, give the scientific categorization and demonstrate the future headings.

Related Results

Design of Malicious Code Detection System Based on Binary Code Slicing
Design of Malicious Code Detection System Based on Binary Code Slicing
<p>Malicious code threatens the safety of computer systems. Researching malicious code design techniques and mastering code behavior patterns are the basic work of network se...
Learning-Based Detection for Malicious Android Application Using Code Vectorization
Learning-Based Detection for Malicious Android Application Using Code Vectorization
The malicious APK (Android Application Package) makers use some techniques such as code obfuscation and code encryption to avoid existing detection methods, which poses new challen...
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Facing the surge in malicious behaviors in the network environment, the existing cybersecurity knowledge graph suffers from fragmented security knowledge and limited application sc...
Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks
Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks
<p>Accessing and retrieving users’ browser and network information is a common practice used by advertisers and many online services to deliver targeted ads and explicit impr...
The Dark Side of Native Code on Android
The Dark Side of Native Code on Android
<p>From a little research experiment to an essential component of military arsenals, malicious software has constantly been growing and evolving for more than three decades. ...
ENSEMBLE-DROID: Optimized Multi-Model Detection of Android Malware
ENSEMBLE-DROID: Optimized Multi-Model Detection of Android Malware
Android platform due to open-source characteristics and Google backing has the largest global market share. Being the world’s most popular operating system, it has drawn the attent...
Clone detection to prevent software piracy in android play store
Clone detection to prevent software piracy in android play store
Android is currently one of the most popular smartphone operating systems. Many application developers have been enticed by the enormous demand for mobile smartphone devices. The a...
An Analysis of Machine Learning-Based Android Malware Detection Approaches
An Analysis of Machine Learning-Based Android Malware Detection Approaches
Abstract Despite the fact that Android apps are rapidly expanding throughout the mobile ecosystem, Android malware continues to emerge. Malware operations are on the...

Back to Top