4.5 Review

A Systematic Overview of Android Malware Detection

Journal

APPLIED ARTIFICIAL INTELLIGENCE
Volume 36, Issue 1, Pages -

Publisher

TAYLOR & FRANCIS INC
DOI: 10.1080/08839514.2021.2007327

Keywords

-

Funding

  1. National Natural Science Foundation of China [62101368, U20A20161, U1836103]
  2. Basic Research Program of China [2019-JCJQ-ZD-113]

Ask authors/readers for more resources

This paper provides a detailed description of the Android OS environment, feature selection, malware classification algorithms, and challenges faced by machine learning detection. By elaborating on key perspectives such as feature extraction, data preprocessing, and model selection, it comprehensively discusses the methods of malware detection. Additionally, it focuses on the study of deterioration issues and evasion attacks in machine learning detectors.
Due to the completely open-source nature of Android, the exploitable vulnerability of malware attacks is increasing. To stay ahead of other similar review work attempting to deal with the serious security problem of the Android environment, this work not only summarizes the approaches in the malware classification phase but also lays emphasis on the Android feature selection algorithm and presents some areas neglected in previous works in the field of Android malware detection, like limitations and commonly applied datasets in machine learning-based models. In this paper, the Android OS environment, feature selection, classification models, and confronted challenges of machine learning detection are described in detail. Based on the brief introduction to Android background knowledge, feature selection methods are elaborated from key perspectives as feature extraction, raw data preprocessing, valid feature subsets selection, and machine learning-based selection models. For the algorithms of the malware classification, machine learning methods are categorized according to different standards to present an all-around view. Furthermore, this paper focuses on the study of deterioration problems and evasion attacks in machine learning detectors.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available