{"title":"探索机器学习和深度学习技术在安卓恶意软件检测中的有效性","authors":"Khalid Murad Abdullah, Ahmed Adnan Hadi","doi":"10.55529/jipirs.42.1.10","DOIUrl":null,"url":null,"abstract":"The increasing occurrence of Android devices, coupled with their get entry to to touchy and personal information, has made them a high goal for malware developers. The open-supply nature of the Android platform has contributed to the developing vulnerability of malware assaults. presently, Android malware (AM) analysis strategies may be labeled into foremost categories: static evaluation and dynamic evaluation. These techniques are employed to analyze and understand the behavior of AM to mitigate its impact. This research explores the performance of DL model architectures, such as CNN-GRU, as well as traditional ML algorithms including SVM, Random Forest (RF), and decision tree (DT). The DT model achieves the highest accuracy (ACC) of 0.93, followed by RF (0.89), CNN-GRU (0.91), and SVM (0.90). These findings contribute valuable insights for the development of effective malware detection systems, emphasizing the suitability and effectiveness of the examined models in identifying AM.","PeriodicalId":517163,"journal":{"name":"Feb-Mar 2024","volume":"21 7","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Exploring the Effectiveness of Machine and Deep Learning Techniques for Android Malware Detection\",\"authors\":\"Khalid Murad Abdullah, Ahmed Adnan Hadi\",\"doi\":\"10.55529/jipirs.42.1.10\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The increasing occurrence of Android devices, coupled with their get entry to to touchy and personal information, has made them a high goal for malware developers. The open-supply nature of the Android platform has contributed to the developing vulnerability of malware assaults. presently, Android malware (AM) analysis strategies may be labeled into foremost categories: static evaluation and dynamic evaluation. These techniques are employed to analyze and understand the behavior of AM to mitigate its impact. This research explores the performance of DL model architectures, such as CNN-GRU, as well as traditional ML algorithms including SVM, Random Forest (RF), and decision tree (DT). The DT model achieves the highest accuracy (ACC) of 0.93, followed by RF (0.89), CNN-GRU (0.91), and SVM (0.90). These findings contribute valuable insights for the development of effective malware detection systems, emphasizing the suitability and effectiveness of the examined models in identifying AM.\",\"PeriodicalId\":517163,\"journal\":{\"name\":\"Feb-Mar 2024\",\"volume\":\"21 7\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Feb-Mar 2024\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.55529/jipirs.42.1.10\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Feb-Mar 2024","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.55529/jipirs.42.1.10","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
摘要
安卓设备的使用率越来越高,再加上它们可以获取敏感信息和个人信息,使其成为恶意软件开发者的目标。目前,安卓恶意软件(AM)分析策略可分为几大类:静态评估和动态评估。这些技术用于分析和了解 AM 的行为,以减轻其影响。本研究探讨了 DL 模型架构(如 CNN-GRU)以及传统 ML 算法(包括 SVM、随机森林 (RF) 和决策树 (DT))的性能。DT 模型的准确率(ACC)最高,达到 0.93,其次是 RF(0.89)、CNN-GRU(0.91)和 SVM(0.90)。这些发现为开发有效的恶意软件检测系统提供了宝贵的见解,强调了所研究模型在识别 AM 方面的适用性和有效性。
Exploring the Effectiveness of Machine and Deep Learning Techniques for Android Malware Detection
The increasing occurrence of Android devices, coupled with their get entry to to touchy and personal information, has made them a high goal for malware developers. The open-supply nature of the Android platform has contributed to the developing vulnerability of malware assaults. presently, Android malware (AM) analysis strategies may be labeled into foremost categories: static evaluation and dynamic evaluation. These techniques are employed to analyze and understand the behavior of AM to mitigate its impact. This research explores the performance of DL model architectures, such as CNN-GRU, as well as traditional ML algorithms including SVM, Random Forest (RF), and decision tree (DT). The DT model achieves the highest accuracy (ACC) of 0.93, followed by RF (0.89), CNN-GRU (0.91), and SVM (0.90). These findings contribute valuable insights for the development of effective malware detection systems, emphasizing the suitability and effectiveness of the examined models in identifying AM.