Skip to main content

2022 | OriginalPaper | Buchkapitel

A Systematic Literature Review on the Mobile Malware Detection Methods

verfasst von : Yu-kyung Kim, Jemin Justin Lee, Myong-Hyun Go, Hae Young Kang, Kyungho Lee

Erschienen in: Mobile Internet Security

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the advent of the 5G network, the number of mobile users has drastically increased. Consequently, the users are much more susceptible to cyber-attacks such as mobile malware. In order to combat mobile malware, recent studies have employed machine learning techniques. This paper revisits existing research on machine learning-based mobile malware detection in cybersecurity. Our study focuses on subjects such as mobile system destruction and information leaks. We explore the mobile malware detection techniques utilized in recent studies based on the attack intentions such as (i) Server, (ii) Network, (iii) Client Software, (iv) Client Hardware, and (v) User. We hope our study can provide future research directions and a framework for a thorough evaluation. Furthermore, we review and summarize security challenges related to cybersecurity that can lead to improved and more practical research.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Shabtai, A., et al.: Mobile malware detection through analysis of deviations in application network behavior. Comput. Secur. 43, 1–18 (2014)CrossRef Shabtai, A., et al.: Mobile malware detection through analysis of deviations in application network behavior. Comput. Secur. 43, 1–18 (2014)CrossRef
2.
Zurück zum Zitat Abawajy, J.H., Kelarev, A.: Iterative classifier fusion system for the detection of android malware. IEEE Trans. Big Data 5, 282–292 (2017). IEEE Abawajy, J.H., Kelarev, A.: Iterative classifier fusion system for the detection of android malware. IEEE Trans. Big Data 5, 282–292 (2017). IEEE
3.
Zurück zum Zitat Abuthawabeh, M., Mahmoud, K.: Enhanced android malware detection and family classification using conversation-level network traffic features. Int. Arab J. Inf. Technol. 17, 607–614 (2020) Abuthawabeh, M., Mahmoud, K.: Enhanced android malware detection and family classification using conversation-level network traffic features. Int. Arab J. Inf. Technol. 17, 607–614 (2020)
4.
Zurück zum Zitat Alazab, M., Alazab, M., Shalaginov, A., Mesleh, A., Awajan, A.: Intelligent mobile malware detection using permission requests and api calls. Future Gener. Comput. Syst. 107, 509–521. Elsevier (2020) Alazab, M., Alazab, M., Shalaginov, A., Mesleh, A., Awajan, A.: Intelligent mobile malware detection using permission requests and api calls. Future Gener. Comput. Syst. 107, 509–521. Elsevier (2020)
6.
Zurück zum Zitat Almomani, I., et al.: Android ransomware detection based on a hybrid evolutionary approach in the context of highly imbalanced data. IEEE Access 9, 57674–57691 (2021). IEEE Almomani, I., et al.: Android ransomware detection based on a hybrid evolutionary approach in the context of highly imbalanced data. IEEE Access 9, 57674–57691 (2021). IEEE
7.
Zurück zum Zitat Alswaina, F., Elleithy, K.: Android malware permission-based multi-class classification using extremely randomized trees. IEEE Access 6, 76217–76227 (2018). IEEE Alswaina, F., Elleithy, K.: Android malware permission-based multi-class classification using extremely randomized trees. IEEE Access 6, 76217–76227 (2018). IEEE
8.
Zurück zum Zitat Amamra, A., Robert, J.M., Abraham, A., Talhi, C.: Generative versus discriminative classifiers for android anomaly-based detection system using system calls filtering and abstraction process. Secur. Commun. Netw. 9, 3483–3495 (2016). Wiley Online Library Amamra, A., Robert, J.M., Abraham, A., Talhi, C.: Generative versus discriminative classifiers for android anomaly-based detection system using system calls filtering and abstraction process. Secur. Commun. Netw. 9, 3483–3495 (2016). Wiley Online Library
9.
Zurück zum Zitat Amouri, A., Alaparthy, V.T., Morgera, S.D.: A machine learning based intrusion detection system for mobile internet of things. Sensors 20, 461 (2020). Multidisciplinary Digital Publishing Institute Amouri, A., Alaparthy, V.T., Morgera, S.D.: A machine learning based intrusion detection system for mobile internet of things. Sensors 20, 461 (2020). Multidisciplinary Digital Publishing Institute
12.
Zurück zum Zitat Arif, M.H., Li, J., Iqbal, M., Liu, K.: Sentiment analysis and spam detection in short informal text using learning classifier systems. Soft. Comput. 22(21), 7281–7291 (2018)CrossRef Arif, M.H., Li, J., Iqbal, M., Liu, K.: Sentiment analysis and spam detection in short informal text using learning classifier systems. Soft. Comput. 22(21), 7281–7291 (2018)CrossRef
13.
Zurück zum Zitat Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K.: Drebin: effective and explainable detection of android malware in your pocket. In: Ndss, pp. 23–26. FFFF (2014) Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K.: Drebin: effective and explainable detection of android malware in your pocket. In: Ndss, pp. 23–26. FFFF (2014)
14.
Zurück zum Zitat Arshad, S., Shah, M.A., Wahid, A., Mehmood, A., Song, H., Yu, H.: Samadroid: a novel 3-level hybrid malware detection model for android operating system. IEEE Access 6, 4321–4339 (2018). IEEE Arshad, S., Shah, M.A., Wahid, A., Mehmood, A., Song, H., Yu, H.: Samadroid: a novel 3-level hybrid malware detection model for android operating system. IEEE Access 6, 4321–4339 (2018). IEEE
15.
Zurück zum Zitat Bai, H., Xie, N., Di, X., Ye, Q.: Famd: a fast multifeature android malware detection framework, design, and implementation. IEEE Access 8, 194729–194740 (2020). IEEE Bai, H., Xie, N., Di, X., Ye, Q.: Famd: a fast multifeature android malware detection framework, design, and implementation. IEEE Access 8, 194729–194740 (2020). IEEE
16.
Zurück zum Zitat Bai, Y., Xing, Z., Ma, D., Li, X., Feng, Z.: Comparative analysis of feature representations and machine learning methods in android family classification. Comput. Netw. 184, 107639 (2021). Elsevier Bai, Y., Xing, Z., Ma, D., Li, X., Feng, Z.: Comparative analysis of feature representations and machine learning methods in android family classification. Comput. Netw. 184, 107639 (2021). Elsevier
18.
Zurück zum Zitat Breiman, L., Friedman, J.H., Olshen, R.A., Stone, C.J.: Classification and Regression Trees. Routledge, Abingdon-on-Thames (2017) Breiman, L., Friedman, J.H., Olshen, R.A., Stone, C.J.: Classification and Regression Trees. Routledge, Abingdon-on-Thames (2017)
20.
Zurück zum Zitat Burstein, J., et al.: Automated scoring using a hybrid feature identification technique. In: 36th Annual Meeting of the Association for Computational Linguistics and 17th International Conference on Computational Linguistics, vol. 1, pp. 206–210 (1998) Burstein, J., et al.: Automated scoring using a hybrid feature identification technique. In: 36th Annual Meeting of the Association for Computational Linguistics and 17th International Conference on Computational Linguistics, vol. 1, pp. 206–210 (1998)
21.
Zurück zum Zitat Cai, H., Meng, N., Ryder, B., Yao, D.: Droidcat: effective android malware detection and categorization via app-level profiling. IEEE Trans. Inf. Forensics and Secur. 14, 1455–1470 (2018). IEEE Cai, H., Meng, N., Ryder, B., Yao, D.: Droidcat: effective android malware detection and categorization via app-level profiling. IEEE Trans. Inf. Forensics and Secur. 14, 1455–1470 (2018). IEEE
22.
Zurück zum Zitat Cai, L., Li, Y., Xiong, Z.: Jowmdroid: android malware detection based on feature weighting with joint optimization of weight-mapping and classifier parameters. Comput. Secur. 100, 102086 (2021). Elsevier Cai, L., Li, Y., Xiong, Z.: Jowmdroid: android malware detection based on feature weighting with joint optimization of weight-mapping and classifier parameters. Comput. Secur. 100, 102086 (2021). Elsevier
23.
Zurück zum Zitat Cai, M., Jiang, Y., Gao, C., Li, H., Yuan, W.: Learning features from enhanced function call graphs for android malware detection. Neurocomputing 423, 301–307 (2021). Elsevier Cai, M., Jiang, Y., Gao, C., Li, H., Yuan, W.: Learning features from enhanced function call graphs for android malware detection. Neurocomputing 423, 301–307 (2021). Elsevier
24.
Zurück zum Zitat Caviglione, L., Gaggero, M., Lalande, J.F., Mazurczyk, W., Urbański, M.: Seeing the unseen: revealing mobile malware hidden communications via energy consumption and artificial intelligence. IEEE Trans. Inf. Forensics Secur. 11, 799–810 (2015). IEEE Caviglione, L., Gaggero, M., Lalande, J.F., Mazurczyk, W., Urbański, M.: Seeing the unseen: revealing mobile malware hidden communications via energy consumption and artificial intelligence. IEEE Trans. Inf. Forensics Secur. 11, 799–810 (2015). IEEE
25.
Zurück zum Zitat Chen, T., Mao, Q., Yang, Y., Lv, M., Zhu, J.: Tinydroid: a lightweight and efficient model for android malware detection and classification, vol. 2018. Hindawi (2018) Chen, T., Mao, Q., Yang, Y., Lv, M., Zhu, J.: Tinydroid: a lightweight and efficient model for android malware detection and classification, vol. 2018. Hindawi (2018)
26.
Zurück zum Zitat Chen, X., et al.: Android hiv: a study of repackaging malware for evading machine-learning detection. IEEE Trans. Inf. Forensics Secur. 15, 987–1001 (2019). IEEE Chen, X., et al.: Android hiv: a study of repackaging malware for evading machine-learning detection. IEEE Trans. Inf. Forensics Secur. 15, 987–1001 (2019). IEEE
27.
Zurück zum Zitat Chen, Z., et al.: Machine learning based mobile malware detection using highly imbalanced network traffic. Inf. Sci. 433, 346–364 (2018). Elsevier Chen, Z., et al.: Machine learning based mobile malware detection using highly imbalanced network traffic. Inf. Sci. 433, 346–364 (2018). Elsevier
28.
Zurück zum Zitat Christianah, A., Gyunka, B., Oluwatobi, A.: Optimizing android malware detection via ensemble learning. 61–78 (2020) Christianah, A., Gyunka, B., Oluwatobi, A.: Optimizing android malware detection via ensemble learning. 61–78 (2020)
30.
Zurück zum Zitat Costa, V.G.T.D., Barbon, S., Miani, R.S., Rodrigues, J.J., Zarpelão, B.B.: Mobile botnets detection based on machine learning over system calls. Int. J. Secur. Netw. 14, 103–118 (2019). Inderscience Publishers (IEL) Costa, V.G.T.D., Barbon, S., Miani, R.S., Rodrigues, J.J., Zarpelão, B.B.: Mobile botnets detection based on machine learning over system calls. Int. J. Secur. Netw. 14, 103–118 (2019). Inderscience Publishers (IEL)
31.
Zurück zum Zitat De Lorenzo, A., Martinelli, F., Medvet, E., Mercaldo, F., Santone, A.: Visualizing the outcome of dynamic analysis of android malware with vizmal. J. Inf. Secur. Appl. 50, 102423 (2020). Elsevier De Lorenzo, A., Martinelli, F., Medvet, E., Mercaldo, F., Santone, A.: Visualizing the outcome of dynamic analysis of android malware with vizmal. J. Inf. Secur. Appl. 50, 102423 (2020). Elsevier
32.
Zurück zum Zitat Demontis, A., et al.: Yes, machine learning can be more secure! a case study on android malware detection. IEEE Trans. Dependable Secure Comput. 16, 711–724 (2017). IEEE Demontis, A., et al.: Yes, machine learning can be more secure! a case study on android malware detection. IEEE Trans. Dependable Secure Comput. 16, 711–724 (2017). IEEE
33.
Zurück zum Zitat Dey, S., Ye, Q., Sampalli, S.: A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks. Inf. Fusion 49, 205–215 (2019). Elsevier Dey, S., Ye, Q., Sampalli, S.: A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks. Inf. Fusion 49, 205–215 (2019). Elsevier
34.
Zurück zum Zitat Domingos, P., Pazzani, M.: On the optimality of the simple bayesian classifier under zero-one loss. Mach. Learn. 29(2), 103–130 (1997)CrossRef Domingos, P., Pazzani, M.: On the optimality of the simple bayesian classifier under zero-one loss. Mach. Learn. 29(2), 103–130 (1997)CrossRef
35.
Zurück zum Zitat Du, Y., Wang, J., Li, Q.: An android malware detection approach using community structures of weighted function call graphs. IEEE Access 5, 17478–17486 (2017). IEEE Du, Y., Wang, J., Li, Q.: An android malware detection approach using community structures of weighted function call graphs. IEEE Access 5, 17478–17486 (2017). IEEE
36.
Zurück zum Zitat Egele, M., Scholte, T., Kirda, E., Kruegel, C.: A survey on automated dynamic malware-analysis techniques and tools. ACM Comput. Surv. (CSUR) 44(2), 1–42 (2008)CrossRef Egele, M., Scholte, T., Kirda, E., Kruegel, C.: A survey on automated dynamic malware-analysis techniques and tools. ACM Comput. Surv. (CSUR) 44(2), 1–42 (2008)CrossRef
37.
Zurück zum Zitat Egitmen, A., Bulut, I., Aygun, R., Gunduz, A.B., Seyrekbasan, O., Yavuz, A.G.: Combat mobile evasive malware via skip-gram-based malware detection, vol. 2020. Hindawi (2020) Egitmen, A., Bulut, I., Aygun, R., Gunduz, A.B., Seyrekbasan, O., Yavuz, A.G.: Combat mobile evasive malware via skip-gram-based malware detection, vol. 2020. Hindawi (2020)
38.
Zurück zum Zitat Fan, M., Luo, X., Liu, J., Nong, C., Zheng, Q., Liu, T.: Ctdroid: leveraging a corpus of technical blogs for android malware analysis. IEEE Trans. Reliab. 69, 124–138 (2019). IEEE Fan, M., Luo, X., Liu, J., Nong, C., Zheng, Q., Liu, T.: Ctdroid: leveraging a corpus of technical blogs for android malware analysis. IEEE Trans. Reliab. 69, 124–138 (2019). IEEE
39.
Zurück zum Zitat Feng, P., Ma, J., Sun, C., Xu, X., Ma, Y.: A novel dynamic android malware detection system with ensemble learning. IEEE Access 6, 30996–31011 (2018). IEEE Feng, P., Ma, J., Sun, C., Xu, X., Ma, Y.: A novel dynamic android malware detection system with ensemble learning. IEEE Access 6, 30996–31011 (2018). IEEE
41.
Zurück zum Zitat Garcia, J., Hammad, M., Malek, S.: Lightweight, obfuscation-resilient detection and family identification of android malware. ACM Trans. Softw. Eng. Methodol. (TOSEM) 26, 1–29 (2018). ACM New York, NY, USA Garcia, J., Hammad, M., Malek, S.: Lightweight, obfuscation-resilient detection and family identification of android malware. ACM Trans. Softw. Eng. Methodol. (TOSEM) 26, 1–29 (2018). ACM New York, NY, USA
42.
Zurück zum Zitat Garg, S., Baliyan, N.: A novel parallel classifier scheme for vulnerability detection in android. 77, 12–26. Elsevier (2019) Garg, S., Baliyan, N.: A novel parallel classifier scheme for vulnerability detection in android. 77, 12–26. Elsevier (2019)
44.
Zurück zum Zitat Gong, L., et al.: Systematically landing machine learning onto market-scale mobile malware detection. IEEE (2020) Gong, L., et al.: Systematically landing machine learning onto market-scale mobile malware detection. IEEE (2020)
45.
Zurück zum Zitat Hartigan, J.A., Wong, M.A.: Algorithm as 136: a k-means clustering algorithm. J. R. Stat. Soc. Ser. c (Appl. Stat.) 28(1), 100–108 (1979) Hartigan, J.A., Wong, M.A.: Algorithm as 136: a k-means clustering algorithm. J. R. Stat. Soc. Ser. c (Appl. Stat.) 28(1), 100–108 (1979)
46.
Zurück zum Zitat Hinton, G.E., Sejnowski, T.J., et al.: Unsupervised Learning: Foundations of Neural Computation. MIT Press, Cambridge (1999) Hinton, G.E., Sejnowski, T.J., et al.: Unsupervised Learning: Foundations of Neural Computation. MIT Press, Cambridge (1999)
47.
Zurück zum Zitat Hu, D., Ma, Z., Zhang, X., Li, P., Ye, D., Ling, B.: The concept drift problem in android malware detection and its solution, vol. 2017. Hindawi (2017) Hu, D., Ma, Z., Zhang, X., Li, P., Ye, D., Ling, B.: The concept drift problem in android malware detection and its solution, vol. 2017. Hindawi (2017)
48.
Zurück zum Zitat Hull, D., Pettifer, S.R., Kell, D.B.: Defrosting the digital library: bibliographic tools for the next generation web. PLoS Comput. Biol. 4(10), e1000204 (2008)CrossRef Hull, D., Pettifer, S.R., Kell, D.B.: Defrosting the digital library: bibliographic tools for the next generation web. PLoS Comput. Biol. 4(10), e1000204 (2008)CrossRef
49.
Zurück zum Zitat Idrees, F., Rajarajan, M., Conti, M., Chen, T.M., Rahulamathavan, Y.: Pindroid: a novel android malware detection system using ensemble learning methods. Comput. Secur. 68, 36–46 (2017). Elsevier Idrees, F., Rajarajan, M., Conti, M., Chen, T.M., Rahulamathavan, Y.: Pindroid: a novel android malware detection system using ensemble learning methods. Comput. Secur. 68, 36–46 (2017). Elsevier
50.
Zurück zum Zitat Jamaluddin, J., Zotou, N., Edwards, R., Coulton, P.: Mobile phone vulnerabilities: a new generation of malware. In: IEEE International Symposium on Consumer Electronics, 2004. pp. 199–202. IEEE (2004) Jamaluddin, J., Zotou, N., Edwards, R., Coulton, P.: Mobile phone vulnerabilities: a new generation of malware. In: IEEE International Symposium on Consumer Electronics, 2004. pp. 199–202. IEEE (2004)
52.
Zurück zum Zitat Jiang, X.: Security alert: Gingermaster (2011) Jiang, X.: Security alert: Gingermaster (2011)
53.
Zurück zum Zitat Jiang, X.: Security alert: Golddream (2011) Jiang, X.: Security alert: Golddream (2011)
54.
Zurück zum Zitat Jiang, X.: Security alert: new droidkungfu variant (2011) Jiang, X.: Security alert: new droidkungfu variant (2011)
55.
Zurück zum Zitat Jiang, X., Mao, B., Guan, J., Huang, X.: Android malware detection using fine-grained features, vol. 2020. Hindawi (2020) Jiang, X., Mao, B., Guan, J., Huang, X.: Android malware detection using fine-grained features, vol. 2020. Hindawi (2020)
56.
Zurück zum Zitat Jogarah, K.K., Soopaul, K., Beeharry, Y., Hurbungs, V.: Hybrid machine learning algorithms for fault detection in android smartphones. Trans. Emerg. Telecommun. Technol. 29, e3272 (2018). Wiley Online Library Jogarah, K.K., Soopaul, K., Beeharry, Y., Hurbungs, V.: Hybrid machine learning algorithms for fault detection in android smartphones. Trans. Emerg. Telecommun. Technol. 29, e3272 (2018). Wiley Online Library
57.
Zurück zum Zitat Jung, J., Kim, H.J., Cho, S.j., Han, S., Suh, K.: Efficient android malware detection using api rank and machine learning. J. Internet Serv. Inf. Secur. 9, 48–59 (2019) Jung, J., Kim, H.J., Cho, S.j., Han, S., Suh, K.: Efficient android malware detection using api rank and machine learning. J. Internet Serv. Inf. Secur. 9, 48–59 (2019)
58.
Zurück zum Zitat Kang, B., Yerima, S.Y., Sezer, S., McLaughlin, K.: N-gram opcode analysis for android malware detection (2016) Kang, B., Yerima, S.Y., Sezer, S., McLaughlin, K.: N-gram opcode analysis for android malware detection (2016)
59.
Zurück zum Zitat Allix, K., Tegawendé, F., Bissyandé, J.K.Y.L.T.: Androzoo: collecting millions of android apps for the research community. In: 2016 IEEE/ACM 13th Working Conference on Mining Software Repositories (MSR), pp. 468–471. IEEE (2016) Allix, K., Tegawendé, F., Bissyandé, J.K.Y.L.T.: Androzoo: collecting millions of android apps for the research community. In: 2016 IEEE/ACM 13th Working Conference on Mining Software Repositories (MSR), pp. 468–471. IEEE (2016)
60.
Zurück zum Zitat Khabsa, M., Giles, C.L.: The number of scholarly documents on the public web. PLoS ONE 9(5), e93949 (2014)CrossRef Khabsa, M., Giles, C.L.: The number of scholarly documents on the public web. PLoS ONE 9(5), e93949 (2014)CrossRef
61.
Zurück zum Zitat Khan, S., Liu, X., Shakil, K.A., Alam, M.: A survey on scholarly data: from big data perspective. Inf. Process. Manag. 53(4), 923–944 (2017)CrossRef Khan, S., Liu, X., Shakil, K.A., Alam, M.: A survey on scholarly data: from big data perspective. Inf. Process. Manag. 53(4), 923–944 (2017)CrossRef
63.
Zurück zum Zitat Kim, K.C., Ko, E., Kim, J., Yi, J.H.: Intelligent malware detection based on hybrid learning of API and ACG on android. J. Internet Serv. Inf. Secur. 9, 39–48 (2019) Kim, K.C., Ko, E., Kim, J., Yi, J.H.: Intelligent malware detection based on hybrid learning of API and ACG on android. J. Internet Serv. Inf. Secur. 9, 39–48 (2019)
65.
Zurück zum Zitat Kouliaridis, V., Kambourakis, G., Geneiatakis, D., Potha, N.: Two anatomists are better than one-dual-level android malware detection, no. 7 (2020) Kouliaridis, V., Kambourakis, G., Geneiatakis, D., Potha, N.: Two anatomists are better than one-dual-level android malware detection, no. 7 (2020)
66.
Zurück zum Zitat Kumar, A., Agarwal, V., Kumar Shandilya, S., Shalaginov, A., Upadhyay, S., Yadav, B.: Pacer: platform for android malware classification, performance evaluation and threat reporting. Future Internet 12, 66 (2020). Multidisciplinary Digital Publishing Institute Kumar, A., Agarwal, V., Kumar Shandilya, S., Shalaginov, A., Upadhyay, S., Yadav, B.: Pacer: platform for android malware classification, performance evaluation and threat reporting. Future Internet 12, 66 (2020). Multidisciplinary Digital Publishing Institute
67.
Zurück zum Zitat Kumar, R., Zhang, X., Wang, W., Khan, R.U., Kumar, J., Sharif, A.: A multimodal malware detection technique for android IoT devices using various features. IEEE Access 7, 64411–64430 (2019). IEEE Kumar, R., Zhang, X., Wang, W., Khan, R.U., Kumar, J., Sharif, A.: A multimodal malware detection technique for android IoT devices using various features. IEEE Access 7, 64411–64430 (2019). IEEE
68.
Zurück zum Zitat Lashkari, A.H., Kadir, A.F.A., Taheri, L., Ghorbani, A.A.: Toward developing a systematic approach to generate benchmark android malware datasets and classification. In: 2018 International Carnahan Conference on Security Technology (ICCST), pp. 1–7. IEEE (2018) Lashkari, A.H., Kadir, A.F.A., Taheri, L., Ghorbani, A.A.: Toward developing a systematic approach to generate benchmark android malware datasets and classification. In: 2018 International Carnahan Conference on Security Technology (ICCST), pp. 1–7. IEEE (2018)
69.
Zurück zum Zitat Li, C., Mills, K., Niu, D., Zhu, R., Zhang, H., Kinawi, H.: Android malware detection based on factorization machine. IEEE Access 7, 184008–184019 (2019). IEEE Li, C., Mills, K., Niu, D., Zhu, R., Zhang, H., Kinawi, H.: Android malware detection based on factorization machine. IEEE Access 7, 184008–184019 (2019). IEEE
70.
Zurück zum Zitat Li, H., Zhou, S., Yuan, W., Li, J., Leung, H.: Adversarial-example attacks toward android malware detection system. IEEE Syst. J. 14, 653–656 (2019). IEEE Li, H., Zhou, S., Yuan, W., Li, J., Leung, H.: Adversarial-example attacks toward android malware detection system. IEEE Syst. J. 14, 653–656 (2019). IEEE
71.
Zurück zum Zitat Li, J., Sun, L., Yan, Q., Li, Z., Srisa-An, W., Ye, H.: Significant permission identification for machine-learning-based android malware detection. 14, 3216–3225. IEEE (2018) Li, J., Sun, L., Yan, Q., Li, Z., Srisa-An, W., Ye, H.: Significant permission identification for machine-learning-based android malware detection. 14, 3216–3225. IEEE (2018)
74.
Zurück zum Zitat Ma, Z., Ge, H., Liu, Y., Zhao, M., Ma, J.: A combination method for android malware detection based on control flow graphs and machine learning algorithms. IEEE Access 7, 21235–21245 (2019). IEEE Ma, Z., Ge, H., Liu, Y., Zhao, M., Ma, J.: A combination method for android malware detection based on control flow graphs and machine learning algorithms. IEEE Access 7, 21235–21245 (2019). IEEE
76.
Zurück zum Zitat Manning, C.: I. Introduction. ISEAS Publishing (1988) Manning, C.: I. Introduction. ISEAS Publishing (1988)
77.
Zurück zum Zitat Martín, A., Lara-Cabrera, R., Camacho, D.: Android malware detection through hybrid features fusion and ensemble classifiers: The andropytool framework and the omnidroid dataset. Inf. Fusion 52, 128–142 (2019). Elsevier Martín, A., Lara-Cabrera, R., Camacho, D.: Android malware detection through hybrid features fusion and ensemble classifiers: The andropytool framework and the omnidroid dataset. Inf. Fusion 52, 128–142 (2019). Elsevier
78.
Zurück zum Zitat Martín, I., Hernández, J.A., Muñoz, A., Guzmán, A.: Android malware characterization using metadata and machine learning techniques, vol. 2018. Hindawi (2018) Martín, I., Hernández, J.A., Muñoz, A., Guzmán, A.: Android malware characterization using metadata and machine learning techniques, vol. 2018. Hindawi (2018)
79.
Zurück zum Zitat Martín, I., Hernández, J.A., de los Santos, S.: Machine-learning based analysis and classification of android malware signatures. Secur. Commun. Netw. 97, 295–305 (2018). Elsevier Martín, I., Hernández, J.A., de los Santos, S.: Machine-learning based analysis and classification of android malware signatures. Secur. Commun. Netw. 97, 295–305 (2018). Elsevier
80.
Zurück zum Zitat Martinelli, F., Mercaldo, F., Nardone, V., Santone, A., Vaglini, G.: Model checking and machine learning techniques for hummingbad mobile malware detection and mitigation. Simul. Model. Pract. Theory 105, 102169 (2020). Elsevier Martinelli, F., Mercaldo, F., Nardone, V., Santone, A., Vaglini, G.: Model checking and machine learning techniques for hummingbad mobile malware detection and mitigation. Simul. Model. Pract. Theory 105, 102169 (2020). Elsevier
81.
Zurück zum Zitat Mas’ ud, M.Z., Sahib, S., Abdollah, M.F., Selamat, S.R., Huoy, C.Y.: A comparative study on feature selection method for n-gram mobile malware detection. IJ Netw. Secur. 19, 727–733 (2017) Mas’ ud, M.Z., Sahib, S., Abdollah, M.F., Selamat, S.R., Huoy, C.Y.: A comparative study on feature selection method for n-gram mobile malware detection. IJ Netw. Secur. 19, 727–733 (2017)
82.
Zurück zum Zitat Massarelli, L., Aniello, L., Ciccotelli, C., Querzoni, L., Ucci, D., Baldoni, R.: Androdfa: android malware classification based on resource consumption. 11, 326. Multidisciplinary Digital Publishing Institute (2020) Massarelli, L., Aniello, L., Ciccotelli, C., Querzoni, L., Ucci, D., Baldoni, R.: Androdfa: android malware classification based on resource consumption. 11, 326. Multidisciplinary Digital Publishing Institute (2020)
84.
Zurück zum Zitat Milosevic, J., Malek, M., Ferrante, A.: Time, accuracy and power consumption tradeoff in mobile malware detection systems. Comput. Secur. 82, 314–328 (2019). Elsevier Milosevic, J., Malek, M., Ferrante, A.: Time, accuracy and power consumption tradeoff in mobile malware detection systems. Comput. Secur. 82, 314–328 (2019). Elsevier
85.
Zurück zum Zitat Milosevic, N., Dehghantanha, A., Choo, K.K.R.: Machine learning aided android malware classification. Comput. Electr. Eng. 61, 266–274 (2017). Elsevier Milosevic, N., Dehghantanha, A., Choo, K.K.R.: Machine learning aided android malware classification. Comput. Electr. Eng. 61, 266–274 (2017). Elsevier
86.
Zurück zum Zitat Damshenas, M., et al.: M0droid: an android behavioral-based malware detection model. J. Inf. Priv. Secur. 11(3), 141–157 (2015) Damshenas, M., et al.: M0droid: an android behavioral-based malware detection model. J. Inf. Priv. Secur. 11(3), 141–157 (2015)
88.
Zurück zum Zitat Mugabo, E., Zhang, Q.Y.: Intrusion detection method based on support vector machine and information gain for mobile cloud computing. IJ Netw. Secur. 22, 231–241 (2020) Mugabo, E., Zhang, Q.Y.: Intrusion detection method based on support vector machine and information gain for mobile cloud computing. IJ Netw. Secur. 22, 231–241 (2020)
89.
Zurück zum Zitat Narayanan, A., Chandramohan, M., Chen, L., Liu, Y.: Context-aware, adaptive, and scalable android malware detection through online learning. IEEE Trans. Emerg. Top. Comput. Intell. 1, 157–175 (2017). IEEE Narayanan, A., Chandramohan, M., Chen, L., Liu, Y.: Context-aware, adaptive, and scalable android malware detection through online learning. IEEE Trans. Emerg. Top. Comput. Intell. 1, 157–175 (2017). IEEE
91.
Zurück zum Zitat Narayanan, A., Yang, L., Chen, L., Jinliang, L.: Adaptive and scalable android malware detection through online learning. In: 2016 International Joint Conference on Neural Networks (IJCNN), pp. 2484–2491. IEEE (2016) Narayanan, A., Yang, L., Chen, L., Jinliang, L.: Adaptive and scalable android malware detection through online learning. In: 2016 International Joint Conference on Neural Networks (IJCNN), pp. 2484–2491. IEEE (2016)
93.
Zurück zum Zitat Naseer, M., et al.: Malware detection: issues and challenges. J. Phys. Conf. Ser. 1807, 012011. IOP Publishing (2021) Naseer, M., et al.: Malware detection: issues and challenges. J. Phys. Conf. Ser. 1807, 012011. IOP Publishing (2021)
94.
Zurück zum Zitat Navarro, L.C., Navarro, A.K., Gregio, A., Rocha, A., Dahab, R.: Leveraging ontologies and machine-learning techniques for malware analysis into android permissions ecosystems. Comput. Secur. 78, 429–453 (2018). Elsevier Navarro, L.C., Navarro, A.K., Gregio, A., Rocha, A., Dahab, R.: Leveraging ontologies and machine-learning techniques for malware analysis into android permissions ecosystems. Comput. Secur. 78, 429–453 (2018). Elsevier
95.
Zurück zum Zitat Nguyen, G., Nguyen, B.M., Tran, D., Hluchy, L.: A heuristics approach to mine behavioural data logs in mobile malware detection system. Data Knowl. Eng. 115, 129–151 (2018). Elsevier Nguyen, G., Nguyen, B.M., Tran, D., Hluchy, L.: A heuristics approach to mine behavioural data logs in mobile malware detection system. Data Knowl. Eng. 115, 129–151 (2018). Elsevier
96.
Zurück zum Zitat Nguyen-Vu, L., Ahn, J., Jung, S.: Android fragmentation in malware detection. Comput. Secur. 87, 101573 (2019). Elsevier Nguyen-Vu, L., Ahn, J., Jung, S.: Android fragmentation in malware detection. Comput. Secur. 87, 101573 (2019). Elsevier
97.
Zurück zum Zitat Noble, W.S.: What is a support vector machine? Nat. Biotechnol. 24(12), 1565–1567 (2006)CrossRef Noble, W.S.: What is a support vector machine? Nat. Biotechnol. 24(12), 1565–1567 (2006)CrossRef
98.
Zurück zum Zitat Onwuzurike, L., Mariconti, E., Andriotis, P., Cristofaro, E.D., Ross, G., Stringhini, G.: Mamadroid: detecting android malware by building markov chains of behavioral models (extended version). ACM Trans. Priv. Secur. (TOPS) 22, 1–34 (2019). ACM New York, NY, USA Onwuzurike, L., Mariconti, E., Andriotis, P., Cristofaro, E.D., Ross, G., Stringhini, G.: Mamadroid: detecting android malware by building markov chains of behavioral models (extended version). ACM Trans. Priv. Secur. (TOPS) 22, 1–34 (2019). ACM New York, NY, USA
99.
Zurück zum Zitat Palumbo, P., Sayfullina, L., Komashinskiy, D., Eirola, E., Karhunen, J.: A pragmatic android malware detection procedure. Comput. Secur. 70, 689–701 (2017). Elsevier Palumbo, P., Sayfullina, L., Komashinskiy, D., Eirola, E., Karhunen, J.: A pragmatic android malware detection procedure. Comput. Secur. 70, 689–701 (2017). Elsevier
100.
Zurück zum Zitat Pang, Y., Peng, L., Chen, Z., Yang, B., Zhang, H.: Imbalanced learning based on adaptive weighting and gaussian function synthesizing with an application on android malware detection. Inf. Sci. 484, 95–112 (2019). Elsevier Pang, Y., Peng, L., Chen, Z., Yang, B., Zhang, H.: Imbalanced learning based on adaptive weighting and gaussian function synthesizing with an application on android malware detection. Inf. Sci. 484, 95–112 (2019). Elsevier
101.
Zurück zum Zitat Papadopoulos, H., Georgiou, N., Eliades, C., Konstantinidis, A.: Android malware detection with unbiased confidence guarantees. Neurocomputing 280, 3–12 (2018). Elsevier Papadopoulos, H., Georgiou, N., Eliades, C., Konstantinidis, A.: Android malware detection with unbiased confidence guarantees. Neurocomputing 280, 3–12 (2018). Elsevier
102.
Zurück zum Zitat Park, M., You, G., Cho, S.J., Park, M., Han, S.: A framework for identifying obfuscation techniques applied to android apps using machine learning. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10, 22–30 (2019) Park, M., You, G., Cho, S.J., Park, M., Han, S.: A framework for identifying obfuscation techniques applied to android apps using machine learning. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10, 22–30 (2019)
103.
105.
Zurück zum Zitat Priya, V.D., Visalakshi, P.: Detecting android malware using an improved filter based technique in embedded software, vol. 76. Elsevier Radarweg 29, 1043 NX Amsterdam, Netherlands (2020) Priya, V.D., Visalakshi, P.: Detecting android malware using an improved filter based technique in embedded software, vol. 76. Elsevier Radarweg 29, 1043 NX Amsterdam, Netherlands (2020)
106.
Zurück zum Zitat Qiu, J., Luo, W., Pan, L., Tai, Y., Zhang, J., Xiang, Y.: Predicting the impact of android malicious samples via machine learning. IEEE Access 7, 66304–66316 (2019). IEEE Qiu, J., Luo, W., Pan, L., Tai, Y., Zhang, J., Xiang, Y.: Predicting the impact of android malicious samples via machine learning. IEEE Access 7, 66304–66316 (2019). IEEE
107.
Zurück zum Zitat Rasheed, M.M., Faieq, A.K., Hashim, A.A.: Android botnet detection using machine learning, vol. 25 (2020) Rasheed, M.M., Faieq, A.K., Hashim, A.A.: Android botnet detection using machine learning, vol. 25 (2020)
108.
Zurück zum Zitat Reed, R., MarksII, R.J.: Neural Smithing: Supervised Learning in Feedforward Artificial Neural Networks. MIT Press, Cambridge (1999) Reed, R., MarksII, R.J.: Neural Smithing: Supervised Learning in Feedforward Artificial Neural Networks. MIT Press, Cambridge (1999)
109.
Zurück zum Zitat Rehman, Z.U., et al.: Machine learning-assisted signature and heuristic-based detection of malwares in android devices. Comput. Electr. Eng. 69, 828–841 (2018). Elsevier Rehman, Z.U., et al.: Machine learning-assisted signature and heuristic-based detection of malwares in android devices. Comput. Electr. Eng. 69, 828–841 (2018). Elsevier
110.
Zurück zum Zitat Ren, B., Liu, C., Cheng, B., Guo, J., Chen, J.: Mobisentry: towards easy and effective detection of android malware on smartphones, vol. 2018. Hindawi (2018) Ren, B., Liu, C., Cheng, B., Guo, J., Chen, J.: Mobisentry: towards easy and effective detection of android malware on smartphones, vol. 2018. Hindawi (2018)
111.
Zurück zum Zitat Ribeiro, J., Saghezchi, F.B., Mantas, G., Rodriguez, J., Abd-Alhameed, R.A.: Hidroid: prototyping a behavioral host-based intrusion detection and prevention system for android. IEEE Access 8, 23154–23168 (2020). IEEE Ribeiro, J., Saghezchi, F.B., Mantas, G., Rodriguez, J., Abd-Alhameed, R.A.: Hidroid: prototyping a behavioral host-based intrusion detection and prevention system for android. IEEE Access 8, 23154–23168 (2020). IEEE
113.
Zurück zum Zitat Rouse, M., et al.: What is phishing? How it works and how to prevent it (2020) Rouse, M., et al.: What is phishing? How it works and how to prevent it (2020)
114.
Zurück zum Zitat Ruiz, F.: Fakeinstaller leads the attack on android phones (2012). Accessed 1 July 2016 Ruiz, F.: Fakeinstaller leads the attack on android phones (2012). Accessed 1 July 2016
115.
Zurück zum Zitat Safavian, S.R., Landgrebe, D.: A survey of decision tree classifier methodology. IEEE Trans. Syst. Man Cybern. 21(3), 660–674 (1991)MathSciNetCrossRef Safavian, S.R., Landgrebe, D.: A survey of decision tree classifier methodology. IEEE Trans. Syst. Man Cybern. 21(3), 660–674 (1991)MathSciNetCrossRef
116.
Zurück zum Zitat Salah, A., Shalabi, E., Khedr, W.: A lightweight android malware classifier using novel feature selection methods. Symmetry 12, 858 (2020). Multidisciplinary Digital Publishing Institute Salah, A., Shalabi, E., Khedr, W.: A lightweight android malware classifier using novel feature selection methods. Symmetry 12, 858 (2020). Multidisciplinary Digital Publishing Institute
117.
Zurück zum Zitat Mahdavifar, S., Kadir, A.F.A., Fatemi, R., Alhadidi, D., Ghorbani, A.A.: Dynamic android malware category classification using semi-supervised deep learning. In: 2020 IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Cloud and Big Data Computing, International Conference on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), pp. 515–522. IEEE (2020) Mahdavifar, S., Kadir, A.F.A., Fatemi, R., Alhadidi, D., Ghorbani, A.A.: Dynamic android malware category classification using semi-supervised deep learning. In: 2020 IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Cloud and Big Data Computing, International Conference on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), pp. 515–522. IEEE (2020)
118.
Zurück zum Zitat Samra, A.A.A., Qunoo, H.N., Al-Rubaie, F., El-Talli, H.: A survey of static android malware detection techniques. In: 2019 IEEE 7Th Palestinian International Conference on Electrical and Computer Engineering (PICECE), pp. 1–6. IEEE (2019) Samra, A.A.A., Qunoo, H.N., Al-Rubaie, F., El-Talli, H.: A survey of static android malware detection techniques. In: 2019 IEEE 7Th Palestinian International Conference on Electrical and Computer Engineering (PICECE), pp. 1–6. IEEE (2019)
119.
Zurück zum Zitat Samuel, A.L.: Some studies in machine learning using the game of checkers. IBM J. Res. Dev. 3(3), 210–229 (1959)MathSciNetCrossRef Samuel, A.L.: Some studies in machine learning using the game of checkers. IBM J. Res. Dev. 3(3), 210–229 (1959)MathSciNetCrossRef
120.
Zurück zum Zitat Sen, S., Aydogan, E., Aysan, A.I.: Coevolution of mobile malware and anti-malware. IEEE Trans. Inf. Forensics Secur. 13, 2563–2574 (2018). IEEE Sen, S., Aydogan, E., Aysan, A.I.: Coevolution of mobile malware and anti-malware. IEEE Trans. Inf. Forensics Secur. 13, 2563–2574 (2018). IEEE
123.
Zurück zum Zitat Sharma, A., Sahay, S.K.: Group-wise classification approach to improve android malicious apps detection accuracy (2019) Sharma, A., Sahay, S.K.: Group-wise classification approach to improve android malicious apps detection accuracy (2019)
124.
Zurück zum Zitat Sharma, S., Kumar, N., Kumar, R., Krishna, C.R.: The paradox of choice: investigating selection strategies for android malware datasets using a machine-learning approach. Commun. Assoc. Inf. Syst. 46, 26 (2020) Sharma, S., Kumar, N., Kumar, R., Krishna, C.R.: The paradox of choice: investigating selection strategies for android malware datasets using a machine-learning approach. Commun. Assoc. Inf. Syst. 46, 26 (2020)
125.
Zurück zum Zitat Sharmeen, S., Huda, S., Abawajy, J.H., Ismail, W.N., Hassan, M.M.: Malware threats and detection for industrial mobile-iot networks. 6, 15941–15957. IEEE (2018) Sharmeen, S., Huda, S., Abawajy, J.H., Ismail, W.N., Hassan, M.M.: Malware threats and detection for industrial mobile-iot networks. 6, 15941–15957. IEEE (2018)
127.
Zurück zum Zitat Stehman, S.V.: Selecting and interpreting measures of thematic classification accuracy. Remote Sens. Environ. 62(1), 77–89 (1997)CrossRef Stehman, S.V.: Selecting and interpreting measures of thematic classification accuracy. Remote Sens. Environ. 62(1), 77–89 (1997)CrossRef
128.
Zurück zum Zitat Surendran, R., Thomas, T., Emmanuel, S.: Gsdroid: graph signal based compact feature representation for android malware detection. Expert Syst. Appl. 159, 113581 (2020). Elsevier Surendran, R., Thomas, T., Emmanuel, S.: Gsdroid: graph signal based compact feature representation for android malware detection. Expert Syst. Appl. 159, 113581 (2020). Elsevier
129.
Zurück zum Zitat Surendran, R., Thomas, T., Emmanuel, S.: A tan based hybrid model for android malware detection. J. Inf. Secur. Appl. 54, 102483 (2020). Elsevier Surendran, R., Thomas, T., Emmanuel, S.: A tan based hybrid model for android malware detection. J. Inf. Secur. Appl. 54, 102483 (2020). Elsevier
130.
Zurück zum Zitat Taheri, R., Ghahramani, M., Javidan, R., Shojafar, M., Pooranian, Z., Conti, M.: Similarity-based android malware detection using hamming distance of static binary features. 105, 230–247. Elsevier (2020) Taheri, R., Ghahramani, M., Javidan, R., Shojafar, M., Pooranian, Z., Conti, M.: Similarity-based android malware detection using hamming distance of static binary features. 105, 230–247. Elsevier (2020)
131.
Zurück zum Zitat Talal, M., et al.: Comprehensive review and analysis of anti-malware apps for smartphones. Telecommun. Syst. 72(2), 285–337 (2019)CrossRef Talal, M., et al.: Comprehensive review and analysis of anti-malware apps for smartphones. Telecommun. Syst. 72(2), 285–337 (2019)CrossRef
132.
Zurück zum Zitat Tenenboim-Chekina, L., et al.: Detecting application update attack on mobile devices through network featur. In: 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 91–92. IEEE (2013) Tenenboim-Chekina, L., et al.: Detecting application update attack on mobile devices through network featur. In: 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 91–92. IEEE (2013)
133.
Zurück zum Zitat Thomas, D.R., Beresford, A.R., Rice, A.: Security metrics for the android ecosystem. In: Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 87–98 (2015) Thomas, D.R., Beresford, A.R., Rice, A.: Security metrics for the android ecosystem. In: Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 87–98 (2015)
134.
Zurück zum Zitat Tian, K., Yao, D., Ryder, B.G., Tan, G., Peng, G.: Detection of repackaged android malware with code-heterogeneity features. IEEE Trans. Dependable Secure Comput. 17, 64–77 (2017). IEEE Tian, K., Yao, D., Ryder, B.G., Tan, G., Peng, G.: Detection of repackaged android malware with code-heterogeneity features. IEEE Trans. Dependable Secure Comput. 17, 64–77 (2017). IEEE
135.
Zurück zum Zitat Tong, F., Yan, Z.: A hybrid approach of mobile malware detection in android. 103, 22–31. Elsevier (2017) Tong, F., Yan, Z.: A hybrid approach of mobile malware detection in android. 103, 22–31. Elsevier (2017)
136.
Zurück zum Zitat Kouliaridis, V., et al.: A survey on mobile malware detection techniques. IEICE Trans. Inf. Syst. 103(2), 204–211 (2020) Kouliaridis, V., et al.: A survey on mobile malware detection techniques. IEICE Trans. Inf. Syst. 103(2), 204–211 (2020)
138.
Zurück zum Zitat Vinod, P., Zemmari, A., Conti, M.: A machine learning based approach to detect malicious android apps using discriminant system calls. Future Gener. Comput. Syst. 94, 333–350 (2019). Elsevier Vinod, P., Zemmari, A., Conti, M.: A machine learning based approach to detect malicious android apps using discriminant system calls. Future Gener. Comput. Syst. 94, 333–350 (2019). Elsevier
140.
Zurück zum Zitat Wang, S., Chen, Z., Yan, Q., Yang, B., Peng, L., Jia, Z.: A mobile malware detection method using behavior features in network traffic. J. Netw. Comput. Appl. 133, 15–25 (2019). Elsevier Wang, S., Chen, Z., Yan, Q., Yang, B., Peng, L., Jia, Z.: A mobile malware detection method using behavior features in network traffic. J. Netw. Comput. Appl. 133, 15–25 (2019). Elsevier
141.
Zurück zum Zitat Wang, X., Zhang, D., Su, X., Li, W.: Mlifdect: android malware detection based on parallel machine learning and information fusion, vol. 2017. Hindawi (2017) Wang, X., Zhang, D., Su, X., Li, W.: Mlifdect: android malware detection based on parallel machine learning and information fusion, vol. 2017. Hindawi (2017)
142.
Zurück zum Zitat Wang, X., Wang, W., He, Y., Liu, J., Han, Z., Zhang, X.: Characterizing android apps’ behavior for effective detection of malapps at large scale. Future Gener. Comput. Syst. 75, 30–45 (2017). Elsevier Wang, X., Wang, W., He, Y., Liu, J., Han, Z., Zhang, X.: Characterizing android apps’ behavior for effective detection of malapps at large scale. Future Gener. Comput. Syst. 75, 30–45 (2017). Elsevier
143.
Zurück zum Zitat Wang, X., Li, C.: Android malware detection through machine learning on kernel task structures. Neurocomputing 435, 126–150 (2021). Elsevier Wang, X., Li, C.: Android malware detection through machine learning on kernel task structures. Neurocomputing 435, 126–150 (2021). Elsevier
144.
Zurück zum Zitat Wei, L., Luo, W., Weng, J., Zhong, Y., Zhang, X., Yan, Z.: Machine learning-based malicious application detection of android. IEEE Access 5, 25591–25601 (2017). IEEE Wei, L., Luo, W., Weng, J., Zhong, Y., Zhang, X., Yan, Z.: Machine learning-based malicious application detection of android. IEEE Access 5, 25591–25601 (2017). IEEE
145.
Zurück zum Zitat Wei, S., Zhang, Z., Li, S., Jiang, P.: Calibrating network traffic with one-dimensional convolutional neural network with autoencoder and independent recurrent neural network for mobile malware detection, vol. 2021. Hindawi (2021) Wei, S., Zhang, Z., Li, S., Jiang, P.: Calibrating network traffic with one-dimensional convolutional neural network with autoencoder and independent recurrent neural network for mobile malware detection, vol. 2021. Hindawi (2021)
146.
Zurück zum Zitat Wu, B., et al.: Why an android app is classified as malware: toward malware classification interpretation. ACM Trans. Softw. Eng. Methodol. (TOSEM) 30, 1–29 (2021). ACM New York, NY, USA Wu, B., et al.: Why an android app is classified as malware: toward malware classification interpretation. ACM Trans. Softw. Eng. Methodol. (TOSEM) 30, 1–29 (2021). ACM New York, NY, USA
147.
Zurück zum Zitat Wu, Q., Li, M., Zhu, X., Liu, B.: Mviidroid: a multiple view information integration approach for android malware detection and family identification. IEEE MultiMedia 27, 48–57 (2020). IEEE Wu, Q., Li, M., Zhu, X., Liu, B.: Mviidroid: a multiple view information integration approach for android malware detection and family identification. IEEE MultiMedia 27, 48–57 (2020). IEEE
148.
Zurück zum Zitat Wu, S., Wang, P., Li, X., Zhang, Y.: Effective detection of android malware based on the usage of data flow apis and machine learning. Inf. Softw. Technol. 75, 17–25 (2016). Elsevier Wu, S., Wang, P., Li, X., Zhang, Y.: Effective detection of android malware based on the usage of data flow apis and machine learning. Inf. Softw. Technol. 75, 17–25 (2016). Elsevier
149.
Zurück zum Zitat Xiao, L., Li, Y., Huang, X., Du, X.: Cloud-based malware detection game for mobile devices with offloading. IEEE Trans. Mob. Comput. 16, 2742–2750 (2017). IEEE Xiao, L., Li, Y., Huang, X., Du, X.: Cloud-based malware detection game for mobile devices with offloading. IEEE Trans. Mob. Comput. 16, 2742–2750 (2017). IEEE
150.
Zurück zum Zitat Xiao, X., Xiao, X., Jiang, Y., Liu, X., Ye, R.: Identifying android malware with system call co-occurrence matrices. Trans. Emerg. Telecommun. Technol. 27, 675–684 (2016). Wiley Online Library Xiao, X., Xiao, X., Jiang, Y., Liu, X., Ye, R.: Identifying android malware with system call co-occurrence matrices. Trans. Emerg. Telecommun. Technol. 27, 675–684 (2016). Wiley Online Library
151.
Zurück zum Zitat Xin, Y., et al.: Machine learning and deep learning methods for cybersecurity. IEEE Access 6, 35365–35381 (2018)CrossRef Xin, Y., et al.: Machine learning and deep learning methods for cybersecurity. IEEE Access 6, 35365–35381 (2018)CrossRef
152.
Zurück zum Zitat Xu, Y., Wu, C., Zheng, K., Wang, X., Niu, X., Lu, T.: Computing adaptive feature weights with pso to improve android malware detection, vol. 2017. Hindawi (2017) Xu, Y., Wu, C., Zheng, K., Wang, X., Niu, X., Lu, T.: Computing adaptive feature weights with pso to improve android malware detection, vol. 2017. Hindawi (2017)
153.
Zurück zum Zitat Yajin Zhou, X.J.: Dissecting android malware: characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy, pp. 95–109. IEEE (2012) Yajin Zhou, X.J.: Dissecting android malware: characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy, pp. 95–109. IEEE (2012)
154.
Zurück zum Zitat Yang, M., Chen, X., Luo, Y., Zhang, H.: An android malware detection model based on dt-svm, vol. 2020. Hindawi (2020) Yang, M., Chen, X., Luo, Y., Zhang, H.: An android malware detection model based on dt-svm, vol. 2020. Hindawi (2020)
155.
Zurück zum Zitat Yang, M., Wang, S., Ling, Z., Liu, Y., Ni, Z.: Detection of malicious behavior in android apps through api calls and permission uses analysis. Concurrency Comput. Pract. Experience 29, e4172 (2017). Wiley Online Library Yang, M., Wang, S., Ling, Z., Liu, Y., Ni, Z.: Detection of malicious behavior in android apps through api calls and permission uses analysis. Concurrency Comput. Pract. Experience 29, e4172 (2017). Wiley Online Library
156.
Zurück zum Zitat Yang, S., Wu, C., Zhu, S., Wang, H.: A machine learning based approach for mobile app rating manipulation detection, vol. 5. European Alliance for Innovation (EAI) (2019) Yang, S., Wu, C., Zhu, S., Wang, H.: A machine learning based approach for mobile app rating manipulation detection, vol. 5. European Alliance for Innovation (EAI) (2019)
157.
Zurück zum Zitat Ye, Y., Wu, L., Hong, Z., Huang, K.: A risk classification based approach for android malware detection. Tiis 11, 959–981 (2017) Ye, Y., Wu, L., Hong, Z., Huang, K.: A risk classification based approach for android malware detection. Tiis 11, 959–981 (2017)
159.
Zurück zum Zitat Yerima, S.Y., Sezer, S.: Droidfusion: a novel multilevel classifier fusion approach for android malware detection. IEEE Trans. Cybern. 49, 453–466 (2018). IEEE Yerima, S.Y., Sezer, S.: Droidfusion: a novel multilevel classifier fusion approach for android malware detection. IEEE Trans. Cybern. 49, 453–466 (2018). IEEE
160.
Zurück zum Zitat Zhang, H., Luo, S., Zhang, Y., Pan, L.: An efficient android malware detection system based on method-level behavioral semantic analysis. IEEE Access 7, 69246–69256 (2019). IEEE Zhang, H., Luo, S., Zhang, Y., Pan, L.: An efficient android malware detection system based on method-level behavioral semantic analysis. IEEE Access 7, 69246–69256 (2019). IEEE
161.
Zurück zum Zitat Zhang, J., Qin, Z., Zhang, K., Yin, H., Zou, J.: Dalvik opcode graph based android malware variants detection using global topology features. IEEE Access 6, 51964–51974 (2018). IEEE Zhang, J., Qin, Z., Zhang, K., Yin, H., Zou, J.: Dalvik opcode graph based android malware variants detection using global topology features. IEEE Access 6, 51964–51974 (2018). IEEE
162.
Zurück zum Zitat Zhang, Y., Ren, W., Zhu, T., Ren, Y.: Saas: a situational awareness and analysis system for massive android malware detection. Future Gener. Comput. Syst. 95, 548–559 (2019). Elsevier Zhang, Y., Ren, W., Zhu, T., Ren, Y.: Saas: a situational awareness and analysis system for massive android malware detection. Future Gener. Comput. Syst. 95, 548–559 (2019). Elsevier
165.
Zurück zum Zitat Zhu, C., Zhu, Z., Xie, Y., Jiang, W., Zhang, G.: Evaluation of machine learning approaches for android energy bugs detection with revision commits. IEEE Access 7, 85241–85252 (2019). IEEE Zhu, C., Zhu, Z., Xie, Y., Jiang, W., Zhang, G.: Evaluation of machine learning approaches for android energy bugs detection with revision commits. IEEE Access 7, 85241–85252 (2019). IEEE
Metadaten
Titel
A Systematic Literature Review on the Mobile Malware Detection Methods
verfasst von
Yu-kyung Kim
Jemin Justin Lee
Myong-Hyun Go
Hae Young Kang
Kyungho Lee
Copyright-Jahr
2022
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-16-9576-6_19

Premium Partner