Abstract
The dramatic increase in Android-based smart devices has brought technological revolution to improve the overall quality of life and thus making it worth a billion-dollar market. Despite the huge hype surrounding Android market, the prevalent and potentially sophisticated malicious mobile malware has become a serious threat to the popular Android platform and an ideal target for varied cyber adversaries. Conversely, multivector malware efficient and timely detection is extremely challenging because it usually hides itself under legitimate third party software’s and having the capability to be easily crafted on any executable file extension. To better streamline this complex issue of paramount concern, the authors propose a highly proficient hybrid deep learning (DL)-enabled intelligent multi-vector malware detection mechanism. The devised approach leverages Convolutional Neural Networks and Bidirectional Long Short-Term Memory (BiLSTM) to efficiently identify persistent malware. The proposed technique has been thoroughly evaluated with publicly available datasets, standard performance metrics, and state-of-the-art hybrid DL-driven architectures and benchmark DL algorithms. Besides, the proposed framework has been cross-validated and shows out performance both in terms of time efficiency and detection accuracy.
Highlights
Nowadays, Android devices mobile and portability nature has revolutionized the modern communications and infotainment industry
AND DISCUSSIONS we examine the performance of our proposed model (i.e., Convolutional Neural Network (CNN)-Bidirectional Long ShortTerm Memory (BiLSTM)) to explicitly show the outperformance of the algorithm
We elaborate a clear comparison with our constructed hybrid architectures and their performance
Summary
Android devices mobile and portability nature has revolutionized the modern communications and infotainment industry. The prevalent nature of varied Android devices carries huge potential for cyber adversaries. Android systems and devices becomes a highpriority target for the attackers to exploit it for financial gains, information theft, unauthorized access, information disclosure, data surveillance, or throwing the entire systems and network into chaos. The motive behind this is to sabotage the functionality of an Android device and wrack up the confidentiality, integrity and availability of these systems
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.