Abstract

The dramatic increase in Android-based smart devices has brought technological revolution to improve the overall quality of life and thus making it worth a billion-dollar market. Despite the huge hype surrounding Android market, the prevalent and potentially sophisticated malicious mobile malware has become a serious threat to the popular Android platform and an ideal target for varied cyber adversaries. Conversely, multivector malware efficient and timely detection is extremely challenging because it usually hides itself under legitimate third party software’s and having the capability to be easily crafted on any executable file extension. To better streamline this complex issue of paramount concern, the authors propose a highly proficient hybrid deep learning (DL)-enabled intelligent multi-vector malware detection mechanism. The devised approach leverages Convolutional Neural Networks and Bidirectional Long Short-Term Memory (BiLSTM) to efficiently identify persistent malware. The proposed technique has been thoroughly evaluated with publicly available datasets, standard performance metrics, and state-of-the-art hybrid DL-driven architectures and benchmark DL algorithms. Besides, the proposed framework has been cross-validated and shows out performance both in terms of time efficiency and detection accuracy.

Highlights

  • Nowadays, Android devices mobile and portability nature has revolutionized the modern communications and infotainment industry

  • AND DISCUSSIONS we examine the performance of our proposed model (i.e., Convolutional Neural Network (CNN)-Bidirectional Long ShortTerm Memory (BiLSTM)) to explicitly show the outperformance of the algorithm

  • We elaborate a clear comparison with our constructed hybrid architectures and their performance

Read more

Summary

Introduction

Android devices mobile and portability nature has revolutionized the modern communications and infotainment industry. The prevalent nature of varied Android devices carries huge potential for cyber adversaries. Android systems and devices becomes a highpriority target for the attackers to exploit it for financial gains, information theft, unauthorized access, information disclosure, data surveillance, or throwing the entire systems and network into chaos. The motive behind this is to sabotage the functionality of an Android device and wrack up the confidentiality, integrity and availability of these systems

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call