Volume 13, Issue 10

Detection of Android Malware Using Word2Vec and Deep Learning

Author

Zainab Fatima1, Sujata Terdal2

Abstract

Abstract:

To fortify Android devices against evolving threats, the project unfolds with a commitment to contribute to security endeavors significantly. The core purpose is to leverage machine-learning techniques, particularly deep-learning architectures, to construct robust mechanisms for identifying and classifying Android malware. A hybrid deep learning model combining Long Short-Term Memory (LSTM) networks with Convolutional Neural Networks (CNN) is employed to classify the applications as benign or malicious. The LSTM-CNN model is designed to effectively capture both temporal dependencies and spatial patterns within the feature vectors. Additionally, a Random Forest classifier is used to identify the most important features for classification, improving the performance and efficiency of the deep learning model. The proposed approach is evaluated on the CICMalDroid2020 dataset, demonstrating its ability to detect and classify Android malware accurately. This highlights the effectiveness of static feature analysis combined with advanced deep learning architectures for enhancing Android malware detection systems.

 

References:

  1. Feizollah, A., Anuar, N. B., Salleh, R., & Wahab, A. W. A. (2015). A review on feature selection in mobile malware detection. Digital Investigation, 13, 22-37.
  2. Zhang, X., Yang, L., & Gao, Q. (2020). Understanding mobile banking Trojans: A case study on Anubis and Cerberus. Mobile Networks and Applications, 25(1), 207221.
  3. Li, L., Bissyande, T. F., Papadakis, M., & Klein, J. (2017). MaMaDroid: Detecting Android malware by building Markov chains of behavioral models. Proceedings of the ACM Asia Conference on Computer and Communications Security, 159-170.
  4. Alzaylaee, M. K., Yerima, S. Y., & Sezer, S. (2017). DL-Droid: Deep learning based Android malware detection using real devices. Proceedings of the 2017 IEEE Conference on Trust, Security and Privacy in Computing and Communications, 244251.
  5. Kang, D., Lee, H., & Im, E. G. (2019). Android malware detection using a multifeature machine learning model. Journal of Information Security and Applications, 44, 23-34.
  6. Zhang, Y., Yang, P., Guo, J., Xue, M., & Liu, C. (2019). A static Android malware detection method based on improved hybrid features. IEEE Access, 7, 104-117.
  7. Wei, F., Roy, S., & Ou, X. (2017). A deeper look at Android runtime permissions. Proceedings of the 2017 IEEE Symposium on Security and Privacy, 42-57.
  8. Zhou, Y., & Jiang, X. (2012). Dissecting Android malware: Characterization and evolution. Proceedings of the 2012 IEEE Symposium on Security and Privacy, 95109.
  9. Mamatha B, Sujatha P Terdal | A SHAP and LIME based Explainable AI Solution for Predicting Chronic Kidney Diseases.

DOI

https://doi.org/10.62226/ijarst20242513

PAGES : 1510-1515 | 2 VIEWS | 0 DOWNLOADS


Download Full Article

Zainab Fatima1, Sujata Terdal2 | Detection of Android Malware Using Word2Vec and Deep Learning | DOI : https://doi.org/10.62226/ijarst20242513

Journal Frequency: ISSN 2320-1126, Monthly
Paper Submission: Throughout the month
Acceptance Notification: Within 6 days
Subject Areas: Engineering, Science & Technology
Publishing Model: Open Access
Publication Fee: USD 60  USD 50
Publication Impact Factor: 6.76
Certificate Delivery: Digital

Publish your research with IJARST and engage with global scientific minds