Detection and analysis of android malwares using hybrid dual Path bi-LSTM Kepler dynamic graph convolutional network
In past decade, the android malware threats have been rapidly increasing with the widespread usage of internet applications. In respect of security purpose, there are several machine learning techniques attempted to detect the malwares effectively, but failed to achieve the accurate detection due to...
Gespeichert in:
Veröffentlicht in: | International journal of machine learning and cybernetics 2025-02, Vol.16 (2), p.835-853 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | In past decade, the android malware threats have been rapidly increasing with the widespread usage of internet applications. In respect of security purpose, there are several machine learning techniques attempted to detect the malwares effectively, but failed to achieve the accurate detection due to increasing number of features, more time consumption decreases in detection efficiency. To overcome these limitations, in this research work an innovative Hybrid dual path Bidirectional long short-term memory Kepler dynamic graph Convolutional Network (HBKCN) is proposed to analyze and detect android malwares effectively. First, the augmented abstract syntax tree is applied for pre-processing and extracts the string function from each malware. Second, the adaptive aphid ant optimization is utilized to choose the most appropriate features and remove irrelevant features. Finally, the proposed HBKCN classifies benign and malware apps based on their specifications. Four benchmark datasets, namely Drebin, VirusShare, Malgenome -215, and MaMaDroid datasets, are employed to estimate the effectiveness of the technique. The result demonstrates that the HBKCN technique achieved excellent performance with respect to a few important metrics compared to existing methods. Moreover, detection accuracies of 99.2%, 99.1%,99.8% and 99.8% are achieved for the considered datasets, respectively. Also, the computation time is greatly reduced, illustrating the efficiency of the proposed model in identifying android malwares. |
---|---|
ISSN: | 1868-8071 1868-808X |
DOI: | 10.1007/s13042-024-02303-3 |