None Atif Raza Zaidi, None Tahir Abbas, None Hamza Zahid, None Sadaqat Ali Ramay
{"title":"利用深度学习技术检测Android恶意软件的有效性","authors":"None Atif Raza Zaidi, None Tahir Abbas, None Hamza Zahid, None Sadaqat Ali Ramay","doi":"10.52700/jn.v4i2.90","DOIUrl":null,"url":null,"abstract":"The pervasive adoption of Android in the smartphone market has attracted the attention of malicious actors who continually exploit its open system architecture. A number of cybercriminals have been targeting Android in recent times due to its popularity. As a result of the increasing demand for smartphones, malicious users have recently been drawn to Android and taken advantage of its open system design to commit crimes. As Android has grown in popularity, attackers have been targeting it more. It is possible to gain access to data hidden from view using algorithms even though security measures have been implemented. An Android malware detection system based on machine-deep learning has been developed by utilizing dynamic analysis, in which suspected malware is executed in a secure environment in order to observe its behavior, as well as static analysis, in which malware files are examined without being executed on an Android device. As a result of our experimental results, our suggested models have a higher accuracy rate than industry standards, with a static accuracy rate of 99 and a dynamic accuracy rate of 98 for CNN-LSTM","PeriodicalId":16381,"journal":{"name":"JOURNAL OF NANOSCOPE (JN)","volume":"69 6","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Effectiveness Of Detecting Android Malware Using Deep Learning Techniques\",\"authors\":\"None Atif Raza Zaidi, None Tahir Abbas, None Hamza Zahid, None Sadaqat Ali Ramay\",\"doi\":\"10.52700/jn.v4i2.90\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The pervasive adoption of Android in the smartphone market has attracted the attention of malicious actors who continually exploit its open system architecture. A number of cybercriminals have been targeting Android in recent times due to its popularity. As a result of the increasing demand for smartphones, malicious users have recently been drawn to Android and taken advantage of its open system design to commit crimes. As Android has grown in popularity, attackers have been targeting it more. It is possible to gain access to data hidden from view using algorithms even though security measures have been implemented. An Android malware detection system based on machine-deep learning has been developed by utilizing dynamic analysis, in which suspected malware is executed in a secure environment in order to observe its behavior, as well as static analysis, in which malware files are examined without being executed on an Android device. As a result of our experimental results, our suggested models have a higher accuracy rate than industry standards, with a static accuracy rate of 99 and a dynamic accuracy rate of 98 for CNN-LSTM\",\"PeriodicalId\":16381,\"journal\":{\"name\":\"JOURNAL OF NANOSCOPE (JN)\",\"volume\":\"69 6\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-11-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"JOURNAL OF NANOSCOPE (JN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.52700/jn.v4i2.90\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"JOURNAL OF NANOSCOPE (JN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.52700/jn.v4i2.90","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Effectiveness Of Detecting Android Malware Using Deep Learning Techniques
The pervasive adoption of Android in the smartphone market has attracted the attention of malicious actors who continually exploit its open system architecture. A number of cybercriminals have been targeting Android in recent times due to its popularity. As a result of the increasing demand for smartphones, malicious users have recently been drawn to Android and taken advantage of its open system design to commit crimes. As Android has grown in popularity, attackers have been targeting it more. It is possible to gain access to data hidden from view using algorithms even though security measures have been implemented. An Android malware detection system based on machine-deep learning has been developed by utilizing dynamic analysis, in which suspected malware is executed in a secure environment in order to observe its behavior, as well as static analysis, in which malware files are examined without being executed on an Android device. As a result of our experimental results, our suggested models have a higher accuracy rate than industry standards, with a static accuracy rate of 99 and a dynamic accuracy rate of 98 for CNN-LSTM