A Comprehensive Analysis on Various Deep Learning Techniques for Malware Detection in Android Mobile Devices
Due to the recent advancement in cellular communication and android operating system, most of the people prefer android mobile phones for their day-to-day activities. The main advantages of android smart device are its ease of use and efficient processing in terms of storage, computation and communi...
Gespeichert in:
Veröffentlicht in: | SN computer science 2023-09, Vol.4 (5), p.593, Article 593 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 5 |
container_start_page | 593 |
container_title | SN computer science |
container_volume | 4 |
creator | Anusha, M. Karthika, M. |
description | Due to the recent advancement in cellular communication and android operating system, most of the people prefer android mobile phones for their day-to-day activities. The main advantages of android smart device are its ease of use and efficient processing in terms of storage, computation and communication. However, android smart phones are frequently vulnerable to various types of malicious attack from various intruders. Due to the malicious attacks, the mobile devices are getting compromised by the third party applications and there is evident risk of privacy that intruders will gain access control over sensitive information from the compromised mobile devices. In order to overcome the malicious attacks on android operating mobile devices, various researchers has proposed various solutions on providing efficient malware detection system to secure android mobile devices. In this paper, a comprehensive survey on deep learning techniques based on various malware detection systems has been carried out in detail in order to highlight the advantages and limitations of the existing system. Moreover, the proposed survey provides detailed analysis which helps the future researchers to improve the malware detection system in the future. |
doi_str_mv | 10.1007/s42979-023-01894-y |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2921193599</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2921193599</sourcerecordid><originalsourceid>FETCH-LOGICAL-c185y-13cb21fdfbfd61b85f000a28967630d7018722e75bf49f6674ec9c51d3003c533</originalsourceid><addsrcrecordid>eNp9kEtLAzEUhYMoWGr_gKuA69E8JpnJstQntLipbkMmk7Qp02RM2sr8e1Mr6MrVvXDPOdzzAXCN0S1GqLpLJRGVKBChBcK1KIvhDIwI57ioBarO_-yXYJLSBiFEGCpLzkagm8JZ2PbRrI1P7mDg1KtuSC7B4OG7ii7sE7w3podzo6J3fgWXRq-9-9ibBG2IcKG6TxVNFu2M3rlscz6ntDG4Fi5C47rj7eC0SVfgwqoumcnPHIO3x4fl7LmYvz69zKbzQuOaDQWmuiHYtraxLcdNzWz-WJFa8IpT1Fa5ZEWIqVhjS2E5r0qjhWa4pQhRzSgdg5tTbh_D8c-d3IR9zMWSJIJgLCgTIqvISaVjSCkaK_votioOEiN5BCtPYGUGK7_ByiGb6MmUstivTPyN_sf1Bej8e7o</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2921193599</pqid></control><display><type>article</type><title>A Comprehensive Analysis on Various Deep Learning Techniques for Malware Detection in Android Mobile Devices</title><source>Springer Nature - Complete Springer Journals</source><source>ProQuest Central UK/Ireland</source><source>ProQuest Central</source><creator>Anusha, M. ; Karthika, M.</creator><creatorcontrib>Anusha, M. ; Karthika, M.</creatorcontrib><description>Due to the recent advancement in cellular communication and android operating system, most of the people prefer android mobile phones for their day-to-day activities. The main advantages of android smart device are its ease of use and efficient processing in terms of storage, computation and communication. However, android smart phones are frequently vulnerable to various types of malicious attack from various intruders. Due to the malicious attacks, the mobile devices are getting compromised by the third party applications and there is evident risk of privacy that intruders will gain access control over sensitive information from the compromised mobile devices. In order to overcome the malicious attacks on android operating mobile devices, various researchers has proposed various solutions on providing efficient malware detection system to secure android mobile devices. In this paper, a comprehensive survey on deep learning techniques based on various malware detection systems has been carried out in detail in order to highlight the advantages and limitations of the existing system. Moreover, the proposed survey provides detailed analysis which helps the future researchers to improve the malware detection system in the future.</description><identifier>ISSN: 2661-8907</identifier><identifier>ISSN: 2662-995X</identifier><identifier>EISSN: 2661-8907</identifier><identifier>DOI: 10.1007/s42979-023-01894-y</identifier><language>eng</language><publisher>Singapore: Springer Nature Singapore</publisher><subject>Access control ; Accuracy ; Automation ; Cellular communication ; Classification ; Computer Imaging ; Computer Science ; Computer Systems Organization and Communication Networks ; Data Structures and Information Theory ; Datasets ; Deep learning ; Electronic devices ; Energy consumption ; Feature selection ; Industrial IoT and Cyber-Physical Systems ; Information Systems and Communication Service ; Intrusion ; Malware ; Neural networks ; Operating systems ; Original Research ; Pattern Recognition and Graphics ; Pharmacists ; Smartphones ; Software Engineering/Programming and Operating Systems ; Vision</subject><ispartof>SN computer science, 2023-09, Vol.4 (5), p.593, Article 593</ispartof><rights>The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c185y-13cb21fdfbfd61b85f000a28967630d7018722e75bf49f6674ec9c51d3003c533</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s42979-023-01894-y$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2921193599?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,777,781,21369,27905,27906,33725,41469,42538,43786,51300,64364,64368,72218</link.rule.ids></links><search><creatorcontrib>Anusha, M.</creatorcontrib><creatorcontrib>Karthika, M.</creatorcontrib><title>A Comprehensive Analysis on Various Deep Learning Techniques for Malware Detection in Android Mobile Devices</title><title>SN computer science</title><addtitle>SN COMPUT. SCI</addtitle><description>Due to the recent advancement in cellular communication and android operating system, most of the people prefer android mobile phones for their day-to-day activities. The main advantages of android smart device are its ease of use and efficient processing in terms of storage, computation and communication. However, android smart phones are frequently vulnerable to various types of malicious attack from various intruders. Due to the malicious attacks, the mobile devices are getting compromised by the third party applications and there is evident risk of privacy that intruders will gain access control over sensitive information from the compromised mobile devices. In order to overcome the malicious attacks on android operating mobile devices, various researchers has proposed various solutions on providing efficient malware detection system to secure android mobile devices. In this paper, a comprehensive survey on deep learning techniques based on various malware detection systems has been carried out in detail in order to highlight the advantages and limitations of the existing system. Moreover, the proposed survey provides detailed analysis which helps the future researchers to improve the malware detection system in the future.</description><subject>Access control</subject><subject>Accuracy</subject><subject>Automation</subject><subject>Cellular communication</subject><subject>Classification</subject><subject>Computer Imaging</subject><subject>Computer Science</subject><subject>Computer Systems Organization and Communication Networks</subject><subject>Data Structures and Information Theory</subject><subject>Datasets</subject><subject>Deep learning</subject><subject>Electronic devices</subject><subject>Energy consumption</subject><subject>Feature selection</subject><subject>Industrial IoT and Cyber-Physical Systems</subject><subject>Information Systems and Communication Service</subject><subject>Intrusion</subject><subject>Malware</subject><subject>Neural networks</subject><subject>Operating systems</subject><subject>Original Research</subject><subject>Pattern Recognition and Graphics</subject><subject>Pharmacists</subject><subject>Smartphones</subject><subject>Software Engineering/Programming and Operating Systems</subject><subject>Vision</subject><issn>2661-8907</issn><issn>2662-995X</issn><issn>2661-8907</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kEtLAzEUhYMoWGr_gKuA69E8JpnJstQntLipbkMmk7Qp02RM2sr8e1Mr6MrVvXDPOdzzAXCN0S1GqLpLJRGVKBChBcK1KIvhDIwI57ioBarO_-yXYJLSBiFEGCpLzkagm8JZ2PbRrI1P7mDg1KtuSC7B4OG7ii7sE7w3podzo6J3fgWXRq-9-9ibBG2IcKG6TxVNFu2M3rlscz6ntDG4Fi5C47rj7eC0SVfgwqoumcnPHIO3x4fl7LmYvz69zKbzQuOaDQWmuiHYtraxLcdNzWz-WJFa8IpT1Fa5ZEWIqVhjS2E5r0qjhWa4pQhRzSgdg5tTbh_D8c-d3IR9zMWSJIJgLCgTIqvISaVjSCkaK_votioOEiN5BCtPYGUGK7_ByiGb6MmUstivTPyN_sf1Bej8e7o</recordid><startdate>20230901</startdate><enddate>20230901</enddate><creator>Anusha, M.</creator><creator>Karthika, M.</creator><general>Springer Nature Singapore</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope></search><sort><creationdate>20230901</creationdate><title>A Comprehensive Analysis on Various Deep Learning Techniques for Malware Detection in Android Mobile Devices</title><author>Anusha, M. ; Karthika, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c185y-13cb21fdfbfd61b85f000a28967630d7018722e75bf49f6674ec9c51d3003c533</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Access control</topic><topic>Accuracy</topic><topic>Automation</topic><topic>Cellular communication</topic><topic>Classification</topic><topic>Computer Imaging</topic><topic>Computer Science</topic><topic>Computer Systems Organization and Communication Networks</topic><topic>Data Structures and Information Theory</topic><topic>Datasets</topic><topic>Deep learning</topic><topic>Electronic devices</topic><topic>Energy consumption</topic><topic>Feature selection</topic><topic>Industrial IoT and Cyber-Physical Systems</topic><topic>Information Systems and Communication Service</topic><topic>Intrusion</topic><topic>Malware</topic><topic>Neural networks</topic><topic>Operating systems</topic><topic>Original Research</topic><topic>Pattern Recognition and Graphics</topic><topic>Pharmacists</topic><topic>Smartphones</topic><topic>Software Engineering/Programming and Operating Systems</topic><topic>Vision</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Anusha, M.</creatorcontrib><creatorcontrib>Karthika, M.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>SN computer science</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Anusha, M.</au><au>Karthika, M.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Comprehensive Analysis on Various Deep Learning Techniques for Malware Detection in Android Mobile Devices</atitle><jtitle>SN computer science</jtitle><stitle>SN COMPUT. SCI</stitle><date>2023-09-01</date><risdate>2023</risdate><volume>4</volume><issue>5</issue><spage>593</spage><pages>593-</pages><artnum>593</artnum><issn>2661-8907</issn><issn>2662-995X</issn><eissn>2661-8907</eissn><abstract>Due to the recent advancement in cellular communication and android operating system, most of the people prefer android mobile phones for their day-to-day activities. The main advantages of android smart device are its ease of use and efficient processing in terms of storage, computation and communication. However, android smart phones are frequently vulnerable to various types of malicious attack from various intruders. Due to the malicious attacks, the mobile devices are getting compromised by the third party applications and there is evident risk of privacy that intruders will gain access control over sensitive information from the compromised mobile devices. In order to overcome the malicious attacks on android operating mobile devices, various researchers has proposed various solutions on providing efficient malware detection system to secure android mobile devices. In this paper, a comprehensive survey on deep learning techniques based on various malware detection systems has been carried out in detail in order to highlight the advantages and limitations of the existing system. Moreover, the proposed survey provides detailed analysis which helps the future researchers to improve the malware detection system in the future.</abstract><cop>Singapore</cop><pub>Springer Nature Singapore</pub><doi>10.1007/s42979-023-01894-y</doi></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2661-8907 |
ispartof | SN computer science, 2023-09, Vol.4 (5), p.593, Article 593 |
issn | 2661-8907 2662-995X 2661-8907 |
language | eng |
recordid | cdi_proquest_journals_2921193599 |
source | Springer Nature - Complete Springer Journals; ProQuest Central UK/Ireland; ProQuest Central |
subjects | Access control Accuracy Automation Cellular communication Classification Computer Imaging Computer Science Computer Systems Organization and Communication Networks Data Structures and Information Theory Datasets Deep learning Electronic devices Energy consumption Feature selection Industrial IoT and Cyber-Physical Systems Information Systems and Communication Service Intrusion Malware Neural networks Operating systems Original Research Pattern Recognition and Graphics Pharmacists Smartphones Software Engineering/Programming and Operating Systems Vision |
title | A Comprehensive Analysis on Various Deep Learning Techniques for Malware Detection in Android Mobile Devices |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-20T18%3A04%3A07IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Comprehensive%20Analysis%20on%20Various%20Deep%20Learning%20Techniques%20for%20Malware%20Detection%20in%20Android%20Mobile%20Devices&rft.jtitle=SN%20computer%20science&rft.au=Anusha,%20M.&rft.date=2023-09-01&rft.volume=4&rft.issue=5&rft.spage=593&rft.pages=593-&rft.artnum=593&rft.issn=2661-8907&rft.eissn=2661-8907&rft_id=info:doi/10.1007/s42979-023-01894-y&rft_dat=%3Cproquest_cross%3E2921193599%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2921193599&rft_id=info:pmid/&rfr_iscdi=true |