Android malware detection and identification frameworks by leveraging the machine and deep learning techniques: A comprehensive review

Santosh K. Smmarwar, Govind P. Gupta, Sanjay Kumar
{"title":"Android malware detection and identification frameworks by leveraging the machine and deep learning techniques: A comprehensive review","authors":"Santosh K. Smmarwar,&nbsp;Govind P. Gupta,&nbsp;Sanjay Kumar","doi":"10.1016/j.teler.2024.100130","DOIUrl":null,"url":null,"abstract":"<div><p>The ever-increasing growth of online services and smart connectivity of devices have posed the threat of malware to computer system, android-based smart phones, Internet of Things (<em>IoT)</em>-based systems. The anti-malware software plays an important role in order to safeguard the system resources, data and information against these malware attacks. Nowadays, malware writers used advanced techniques like obfuscation, packing, encoding and encryption to hide the malicious activities. Because of these advanced techniques of malware evasion, traditional malware detection system unable to detect new variants of malware. Cyber security has attracted many researchers in the past for designing of Machine Learning (<em>ML</em>) or Deep Learning (<em>DL</em>) based malware detection models. In this study, we present a comprehensive review of the literature on malware detection approaches. The overall literature of the malware detection is grouped into three categories such as review of feature selection (<em>FS</em>) techniques proposed for malware detection, review of <em>ML</em>-based techniques proposed for malware detection and review of <em>DL</em>-based techniques proposed for malware detection. Based on literature review, we have identified the shortcoming and research gaps along with some future directives to design of an efficient malware detection and identification framework.</p></div>","PeriodicalId":101213,"journal":{"name":"Telematics and Informatics Reports","volume":"14 ","pages":"Article 100130"},"PeriodicalIF":0.0000,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772503024000161/pdfft?md5=7e8fc995195206a49129dab94c881a38&pid=1-s2.0-S2772503024000161-main.pdf","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Telematics and Informatics Reports","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2772503024000161","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The ever-increasing growth of online services and smart connectivity of devices have posed the threat of malware to computer system, android-based smart phones, Internet of Things (IoT)-based systems. The anti-malware software plays an important role in order to safeguard the system resources, data and information against these malware attacks. Nowadays, malware writers used advanced techniques like obfuscation, packing, encoding and encryption to hide the malicious activities. Because of these advanced techniques of malware evasion, traditional malware detection system unable to detect new variants of malware. Cyber security has attracted many researchers in the past for designing of Machine Learning (ML) or Deep Learning (DL) based malware detection models. In this study, we present a comprehensive review of the literature on malware detection approaches. The overall literature of the malware detection is grouped into three categories such as review of feature selection (FS) techniques proposed for malware detection, review of ML-based techniques proposed for malware detection and review of DL-based techniques proposed for malware detection. Based on literature review, we have identified the shortcoming and research gaps along with some future directives to design of an efficient malware detection and identification framework.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
利用机器和深度学习技术的安卓恶意软件检测和识别框架:全面回顾
在线服务和设备智能连接的不断增长,给计算机系统、基于安卓系统的智能手机和基于物联网(IoT)的系统带来了恶意软件的威胁。反恶意软件在保护系统资源、数据和信息免受恶意软件攻击方面发挥着重要作用。如今,恶意软件编写者使用混淆、打包、编码和加密等先进技术来隐藏恶意活动。由于这些先进的恶意软件规避技术,传统的恶意软件检测系统无法检测到新变种的恶意软件。过去,网络安全吸引了许多研究人员设计基于机器学习(ML)或深度学习(DL)的恶意软件检测模型。在本研究中,我们全面回顾了有关恶意软件检测方法的文献。恶意软件检测方面的文献总体上分为三类,如针对恶意软件检测提出的特征选择(FS)技术综述、针对恶意软件检测提出的基于 ML 的技术综述和针对恶意软件检测提出的基于 DL 的技术综述。根据文献综述,我们确定了设计高效恶意软件检测和识别框架的不足之处和研究空白,以及未来的一些方向。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
1.90
自引率
0.00%
发文量
0
期刊最新文献
A review on the use of immersive technology in space research Model to explain use of E-Government service change ALZENET: Deep learning-based early prediction of Alzheimer's disease through magnetic resonance imaging analysis The mediating role of attitude towards the technology in shaping artificial intelligence usage among professionals Research on smart city construction in the context of public culture
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1