Detecting malicious android applications based on API calls and permissions using machine learning algorithms

Seif El Dein Mohamed, Mostafa Ashaf, Amr Ehab, Omar Shereef, Haytham Metwaie, Eslam Amer

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Android malware is growing, and the Android operating system is becoming more mainstream. Malware developers are using new strategies to build harmful Android apps, significantly weakening the capability of conventional malware detectors, which are unable to identify these mysterious malicious applications. Machine learning methods can be used to identify unknown Android malware using the functionality gleaned from static and dynamic reviews of Android apps. This article aims to compare and analyze different Android malware detection systems based on detection techniques, analysis processes, and extracted features. We learned scientific investigations in all Android malware detection approaches that use machine learning, demonstrating that machine learning algorithms are often used in this area to identify Malicious programs in the wild.

Original languageEnglish
Title of host publication2021 International Mobile, Intelligent, and Ubiquitous Computing Conference, MIUCC 2021
EditorsAyman Bahaa-Eldin, Ashraf AbdelRaouf, Nada Ayman Mostafa Shorim, Randa Osama Mohamed Rashad, Shereen Essam Elbohy
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages223-228
Number of pages6
ISBN (Electronic)9781665412438
ISBN (Print)9781665429535
DOIs
Publication statusPublished - 9 Jun 2021
Event2021 International Mobile, Intelligent, and Ubiquitous Computing Conference, MIUCC 2021 - Cairo, Egypt
Duration: 26 May 202127 May 2021

Conference

Conference2021 International Mobile, Intelligent, and Ubiquitous Computing Conference, MIUCC 2021
Country/TerritoryEgypt
CityCairo
Period26/05/2127/05/21

Keywords

  • Machine learning algorithms
  • Operating systems
  • Machine learning
  • Detectors
  • Feature extraction
  • Ubiquitous computing
  • Malware

Fingerprint

Dive into the research topics of 'Detecting malicious android applications based on API calls and permissions using machine learning algorithms'. Together they form a unique fingerprint.

Cite this