A Comprehensive Analysis on Various Deep Learning Techniques for Malware Detection in Android Mobile Devices

Due to the recent advancement in cellular communication and android operating system, most of the people prefer android mobile phones for their day-to-day activities. The main advantages of android smart device are its ease of use and efficient processing in terms of storage, computation and communi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:SN computer science 2023-09, Vol.4 (5), p.593, Article 593
Hauptverfasser: Anusha, M., Karthika, M.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 5
container_start_page 593
container_title SN computer science
container_volume 4
creator Anusha, M.
Karthika, M.
description Due to the recent advancement in cellular communication and android operating system, most of the people prefer android mobile phones for their day-to-day activities. The main advantages of android smart device are its ease of use and efficient processing in terms of storage, computation and communication. However, android smart phones are frequently vulnerable to various types of malicious attack from various intruders. Due to the malicious attacks, the mobile devices are getting compromised by the third party applications and there is evident risk of privacy that intruders will gain access control over sensitive information from the compromised mobile devices. In order to overcome the malicious attacks on android operating mobile devices, various researchers has proposed various solutions on providing efficient malware detection system to secure android mobile devices. In this paper, a comprehensive survey on deep learning techniques based on various malware detection systems has been carried out in detail in order to highlight the advantages and limitations of the existing system. Moreover, the proposed survey provides detailed analysis which helps the future researchers to improve the malware detection system in the future.
doi_str_mv 10.1007/s42979-023-01894-y
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2921193599</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2921193599</sourcerecordid><originalsourceid>FETCH-LOGICAL-c185y-13cb21fdfbfd61b85f000a28967630d7018722e75bf49f6674ec9c51d3003c533</originalsourceid><addsrcrecordid>eNp9kEtLAzEUhYMoWGr_gKuA69E8JpnJstQntLipbkMmk7Qp02RM2sr8e1Mr6MrVvXDPOdzzAXCN0S1GqLpLJRGVKBChBcK1KIvhDIwI57ioBarO_-yXYJLSBiFEGCpLzkagm8JZ2PbRrI1P7mDg1KtuSC7B4OG7ii7sE7w3podzo6J3fgWXRq-9-9ibBG2IcKG6TxVNFu2M3rlscz6ntDG4Fi5C47rj7eC0SVfgwqoumcnPHIO3x4fl7LmYvz69zKbzQuOaDQWmuiHYtraxLcdNzWz-WJFa8IpT1Fa5ZEWIqVhjS2E5r0qjhWa4pQhRzSgdg5tTbh_D8c-d3IR9zMWSJIJgLCgTIqvISaVjSCkaK_votioOEiN5BCtPYGUGK7_ByiGb6MmUstivTPyN_sf1Bej8e7o</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2921193599</pqid></control><display><type>article</type><title>A Comprehensive Analysis on Various Deep Learning Techniques for Malware Detection in Android Mobile Devices</title><source>Springer Nature - Complete Springer Journals</source><source>ProQuest Central UK/Ireland</source><source>ProQuest Central</source><creator>Anusha, M. ; Karthika, M.</creator><creatorcontrib>Anusha, M. ; Karthika, M.</creatorcontrib><description>Due to the recent advancement in cellular communication and android operating system, most of the people prefer android mobile phones for their day-to-day activities. The main advantages of android smart device are its ease of use and efficient processing in terms of storage, computation and communication. However, android smart phones are frequently vulnerable to various types of malicious attack from various intruders. Due to the malicious attacks, the mobile devices are getting compromised by the third party applications and there is evident risk of privacy that intruders will gain access control over sensitive information from the compromised mobile devices. In order to overcome the malicious attacks on android operating mobile devices, various researchers has proposed various solutions on providing efficient malware detection system to secure android mobile devices. In this paper, a comprehensive survey on deep learning techniques based on various malware detection systems has been carried out in detail in order to highlight the advantages and limitations of the existing system. Moreover, the proposed survey provides detailed analysis which helps the future researchers to improve the malware detection system in the future.</description><identifier>ISSN: 2661-8907</identifier><identifier>ISSN: 2662-995X</identifier><identifier>EISSN: 2661-8907</identifier><identifier>DOI: 10.1007/s42979-023-01894-y</identifier><language>eng</language><publisher>Singapore: Springer Nature Singapore</publisher><subject>Access control ; Accuracy ; Automation ; Cellular communication ; Classification ; Computer Imaging ; Computer Science ; Computer Systems Organization and Communication Networks ; Data Structures and Information Theory ; Datasets ; Deep learning ; Electronic devices ; Energy consumption ; Feature selection ; Industrial IoT and Cyber-Physical Systems ; Information Systems and Communication Service ; Intrusion ; Malware ; Neural networks ; Operating systems ; Original Research ; Pattern Recognition and Graphics ; Pharmacists ; Smartphones ; Software Engineering/Programming and Operating Systems ; Vision</subject><ispartof>SN computer science, 2023-09, Vol.4 (5), p.593, Article 593</ispartof><rights>The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c185y-13cb21fdfbfd61b85f000a28967630d7018722e75bf49f6674ec9c51d3003c533</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s42979-023-01894-y$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2921193599?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,777,781,21369,27905,27906,33725,41469,42538,43786,51300,64364,64368,72218</link.rule.ids></links><search><creatorcontrib>Anusha, M.</creatorcontrib><creatorcontrib>Karthika, M.</creatorcontrib><title>A Comprehensive Analysis on Various Deep Learning Techniques for Malware Detection in Android Mobile Devices</title><title>SN computer science</title><addtitle>SN COMPUT. SCI</addtitle><description>Due to the recent advancement in cellular communication and android operating system, most of the people prefer android mobile phones for their day-to-day activities. The main advantages of android smart device are its ease of use and efficient processing in terms of storage, computation and communication. However, android smart phones are frequently vulnerable to various types of malicious attack from various intruders. Due to the malicious attacks, the mobile devices are getting compromised by the third party applications and there is evident risk of privacy that intruders will gain access control over sensitive information from the compromised mobile devices. In order to overcome the malicious attacks on android operating mobile devices, various researchers has proposed various solutions on providing efficient malware detection system to secure android mobile devices. In this paper, a comprehensive survey on deep learning techniques based on various malware detection systems has been carried out in detail in order to highlight the advantages and limitations of the existing system. Moreover, the proposed survey provides detailed analysis which helps the future researchers to improve the malware detection system in the future.</description><subject>Access control</subject><subject>Accuracy</subject><subject>Automation</subject><subject>Cellular communication</subject><subject>Classification</subject><subject>Computer Imaging</subject><subject>Computer Science</subject><subject>Computer Systems Organization and Communication Networks</subject><subject>Data Structures and Information Theory</subject><subject>Datasets</subject><subject>Deep learning</subject><subject>Electronic devices</subject><subject>Energy consumption</subject><subject>Feature selection</subject><subject>Industrial IoT and Cyber-Physical Systems</subject><subject>Information Systems and Communication Service</subject><subject>Intrusion</subject><subject>Malware</subject><subject>Neural networks</subject><subject>Operating systems</subject><subject>Original Research</subject><subject>Pattern Recognition and Graphics</subject><subject>Pharmacists</subject><subject>Smartphones</subject><subject>Software Engineering/Programming and Operating Systems</subject><subject>Vision</subject><issn>2661-8907</issn><issn>2662-995X</issn><issn>2661-8907</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kEtLAzEUhYMoWGr_gKuA69E8JpnJstQntLipbkMmk7Qp02RM2sr8e1Mr6MrVvXDPOdzzAXCN0S1GqLpLJRGVKBChBcK1KIvhDIwI57ioBarO_-yXYJLSBiFEGCpLzkagm8JZ2PbRrI1P7mDg1KtuSC7B4OG7ii7sE7w3podzo6J3fgWXRq-9-9ibBG2IcKG6TxVNFu2M3rlscz6ntDG4Fi5C47rj7eC0SVfgwqoumcnPHIO3x4fl7LmYvz69zKbzQuOaDQWmuiHYtraxLcdNzWz-WJFa8IpT1Fa5ZEWIqVhjS2E5r0qjhWa4pQhRzSgdg5tTbh_D8c-d3IR9zMWSJIJgLCgTIqvISaVjSCkaK_votioOEiN5BCtPYGUGK7_ByiGb6MmUstivTPyN_sf1Bej8e7o</recordid><startdate>20230901</startdate><enddate>20230901</enddate><creator>Anusha, M.</creator><creator>Karthika, M.</creator><general>Springer Nature Singapore</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope></search><sort><creationdate>20230901</creationdate><title>A Comprehensive Analysis on Various Deep Learning Techniques for Malware Detection in Android Mobile Devices</title><author>Anusha, M. ; Karthika, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c185y-13cb21fdfbfd61b85f000a28967630d7018722e75bf49f6674ec9c51d3003c533</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Access control</topic><topic>Accuracy</topic><topic>Automation</topic><topic>Cellular communication</topic><topic>Classification</topic><topic>Computer Imaging</topic><topic>Computer Science</topic><topic>Computer Systems Organization and Communication Networks</topic><topic>Data Structures and Information Theory</topic><topic>Datasets</topic><topic>Deep learning</topic><topic>Electronic devices</topic><topic>Energy consumption</topic><topic>Feature selection</topic><topic>Industrial IoT and Cyber-Physical Systems</topic><topic>Information Systems and Communication Service</topic><topic>Intrusion</topic><topic>Malware</topic><topic>Neural networks</topic><topic>Operating systems</topic><topic>Original Research</topic><topic>Pattern Recognition and Graphics</topic><topic>Pharmacists</topic><topic>Smartphones</topic><topic>Software Engineering/Programming and Operating Systems</topic><topic>Vision</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Anusha, M.</creatorcontrib><creatorcontrib>Karthika, M.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>SN computer science</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Anusha, M.</au><au>Karthika, M.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Comprehensive Analysis on Various Deep Learning Techniques for Malware Detection in Android Mobile Devices</atitle><jtitle>SN computer science</jtitle><stitle>SN COMPUT. SCI</stitle><date>2023-09-01</date><risdate>2023</risdate><volume>4</volume><issue>5</issue><spage>593</spage><pages>593-</pages><artnum>593</artnum><issn>2661-8907</issn><issn>2662-995X</issn><eissn>2661-8907</eissn><abstract>Due to the recent advancement in cellular communication and android operating system, most of the people prefer android mobile phones for their day-to-day activities. The main advantages of android smart device are its ease of use and efficient processing in terms of storage, computation and communication. However, android smart phones are frequently vulnerable to various types of malicious attack from various intruders. Due to the malicious attacks, the mobile devices are getting compromised by the third party applications and there is evident risk of privacy that intruders will gain access control over sensitive information from the compromised mobile devices. In order to overcome the malicious attacks on android operating mobile devices, various researchers has proposed various solutions on providing efficient malware detection system to secure android mobile devices. In this paper, a comprehensive survey on deep learning techniques based on various malware detection systems has been carried out in detail in order to highlight the advantages and limitations of the existing system. Moreover, the proposed survey provides detailed analysis which helps the future researchers to improve the malware detection system in the future.</abstract><cop>Singapore</cop><pub>Springer Nature Singapore</pub><doi>10.1007/s42979-023-01894-y</doi></addata></record>
fulltext fulltext
identifier ISSN: 2661-8907
ispartof SN computer science, 2023-09, Vol.4 (5), p.593, Article 593
issn 2661-8907
2662-995X
2661-8907
language eng
recordid cdi_proquest_journals_2921193599
source Springer Nature - Complete Springer Journals; ProQuest Central UK/Ireland; ProQuest Central
subjects Access control
Accuracy
Automation
Cellular communication
Classification
Computer Imaging
Computer Science
Computer Systems Organization and Communication Networks
Data Structures and Information Theory
Datasets
Deep learning
Electronic devices
Energy consumption
Feature selection
Industrial IoT and Cyber-Physical Systems
Information Systems and Communication Service
Intrusion
Malware
Neural networks
Operating systems
Original Research
Pattern Recognition and Graphics
Pharmacists
Smartphones
Software Engineering/Programming and Operating Systems
Vision
title A Comprehensive Analysis on Various Deep Learning Techniques for Malware Detection in Android Mobile Devices
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-20T18%3A04%3A07IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Comprehensive%20Analysis%20on%20Various%20Deep%20Learning%20Techniques%20for%20Malware%20Detection%20in%20Android%20Mobile%20Devices&rft.jtitle=SN%20computer%20science&rft.au=Anusha,%20M.&rft.date=2023-09-01&rft.volume=4&rft.issue=5&rft.spage=593&rft.pages=593-&rft.artnum=593&rft.issn=2661-8907&rft.eissn=2661-8907&rft_id=info:doi/10.1007/s42979-023-01894-y&rft_dat=%3Cproquest_cross%3E2921193599%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2921193599&rft_id=info:pmid/&rfr_iscdi=true