Abstract
The Android operating system, with its market share leadership and open-source nature in smartphones, has become the primary target of malware. However, detecting malicious Android processes has become a significant challenge because of the complexity of size, length, and associations of various important and distinctive elements of Android applications, such as API calls and system calls. In this paper DL-AMDet, a deep learning architecture is proposed to detect Android malware applications based on its static and dynamic features. DL-AMDet consists of two main detection models the first one uses CNN-BiLSTM deep learning method for detecting malware using static analysis. The other model utilizes deep Autoencoders as an anomaly detection model to identify the malware based on dynamic analysis. The performance of the DL-AMDet architecture is evaluated using two different datasets. The results show that DL-AMDet achieves a competitive malware detection accuracy of 99.935 % for static and dynamic analysis models combined. Additionally, the results emphasize the significance of CNN-BiLSTM and Deep Autoencoders models used in DL-AMDet to outperform the existing state-of-the-art techniques.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.