2022
DOI: 10.3991/ijim.v16i01.26433
|View full text |Cite
|
Sign up to set email alerts
|

Android Malware Detection with Deep Learning using RNN from Opcode Sequences

Abstract: Android is the most widely used operating system in smartphones. Mobile users can download and access apps easily from the play store. Due to lack of security awareness and risk associated with mobile apps, malware apps would be downloaded by normal users in general. The consequences after installing a malware app are unpredictable. Malware apps can gather user personal data, browsing history, user profiles, user sensitive data like passwords. Hence, android malware detection is essential for providing securit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…Appropriately, in the domain of ransomware detection in IoT using ML, several research methods have been prominently employed to address the challenges posed by the intricacies of IoT data streams and evolving ransomware signatures. Supervised learning techniques, particularly deep learning models like Convolutional Neural Networks (CNNs) [10] and Recurrent Neural Networks (RNNs) [11] , are widely used due to their efficacy in recognizing patterns from large datasets. Feature selection and extraction, a crucial pre-processing step, often involve techniques like Principal Component Analysis (PCA) [12] and the t-distributed Stochastic Neighbor Embedding (t-SNE) [13] to reduce data dimensionality while retaining essential information.…”
Section: Related Workmentioning
confidence: 99%
“…Appropriately, in the domain of ransomware detection in IoT using ML, several research methods have been prominently employed to address the challenges posed by the intricacies of IoT data streams and evolving ransomware signatures. Supervised learning techniques, particularly deep learning models like Convolutional Neural Networks (CNNs) [10] and Recurrent Neural Networks (RNNs) [11] , are widely used due to their efficacy in recognizing patterns from large datasets. Feature selection and extraction, a crucial pre-processing step, often involve techniques like Principal Component Analysis (PCA) [12] and the t-distributed Stochastic Neighbor Embedding (t-SNE) [13] to reduce data dimensionality while retaining essential information.…”
Section: Related Workmentioning
confidence: 99%
“…Deep neural network approaches have recently been the subject of numerous studies on extending machine learning techniques for unlabelled data. For instance,Lakshmanarao et al [22] recently targeted specific opcode sequences extracted from android applications dataset to train a recurrent neural network for malware classification. Fallah et al [23] modeled an instance of traffic data as a series of flows by using long Short Term memory(LSTM) model for malware detection and classification into legitimate and malicious samples.…”
Section: Related Workmentioning
confidence: 99%