Submitted:
04 May 2023
Posted:
05 May 2023
You are already at the latest version
Abstract
Keywords:
1. Introduction
- DroidDetectMW is proposed as a functional and systematic model for detecting and identifying Android malware and its family and category based on a combination of Dynamic and Static attributes.
- Methods are proposed for selecting features, either statically or dynamically, to use.
- A hybrid fuzzy-metaheuristics-optimization approach is proposed for selecting the optimal dynamic feature subset.
- An enhanced version of the HHO algorithm is proposed to optimize the parameters of ANN for malware detection.
- A Comparison is applied between the results of the proposed Deep learning method with those of more traditional machine learning classifiers in determining how well DroidDetectMW works.
- Evaluate the performance of DroidDetectMW in comparison to seven traditional machine learning methods: the Decision Tree (DT), the support vector machine (SVM), the K-Nearest Neighbor, the Multilayer Perceptron (MLP), the Sequential Minimal Optimization (SMO), Random Forest (RF) and the Naive Bayesian (NB).
- Compared to traditional machine learning algorithms and state-of-the-art studies, DroidDetectMW significantly improves detection performance and achieves good accuracy on both Static and Dynamic attributes.
2. Preliminary
2.1. Harris Hawks optimization (HHO)
2.2. Dataset and malware categories
- Adware: To generate as much revenue as possible from unsolicited banner ads, the ad-ware will display these ads automatically [40].
- Ransomware: One goal of malicious software is to prevent apps from accessing system resources. To extort money from users, it can encrypt their files and demand payment before allowing them to access their files or recover their devices [41].
- Scareware: This malware software uses scare tactics to convince users to buy bogus security updates [42].
- SMS malware: A malicious malware that makes sms calls and sends text messages with-out the user’s permission. The malware operator can use the compromised handsets as a high-end SMS distribution channel [43].
3. Proposed Framework
3.1. Data Pre-processing
3.2. Feature Selection
3.3. Detection and Family Classification
- K-Nearest Neighbors (K-NN) is a simple supervised learning technique. This concept shares terminology with the lazy learner [47]. This technique does not care about the underlying data structure when a new instance appears. Instead, it uses distance measurements (e.g., Euclidean distance, Manhattan distance) to determine which training samples are most similar to the incoming instance. Majority voting notions ultimately determine this new instance’s class.
- Sequential Minimal Optimization (SMO) takes a set of points as its input. The method generates a hyperplane that separates points within the same class by analyzing the gaps between them. Kernel functions fill in the blanks in SMO by revealing data about the distance between two spots.
- SVM is a technique [48] that uses a hyperplane to partition the information. In a nutshell, it’s a dividing line from which to choose. Distances between the nearest data points are called support vectors, and the hyperplane is calculated randomly after the hyperplane is drawn. It searches for the optimal hyperplane that maximizes the profit.
- Random Forest (RF): A considerable number of independent decision trees are used in RF to form a unified whole [49]. Each decision tree generates an output classification for the input data, then compiled by RF and represented graphically based on a majority vote.
- A Decision Tree (DT) is organized in the form of a tree, where each node (whether internal, leaf, terminal) represents a test on an attribute, and each branch (whether internal, leaf, or terminal) carries a class name and the results of the test. The C4.5 algorithm has been utilized in this work to categorize Android malware [50].
- Bayes’ theorem provides the theoretical foundation for the NB idea. The program predicts the probabilities of class membership or the likelihood that a set of tuples belongs to a specific class. Multi-class and binary classification problems [51] both benefit from their application.
- Multilayer Perceptron (MLP): There are the hidden and output layers and the input layer. It can produce results in several different measurement systems. The hidden layer’s output units are fed into the subsequent layer as input. [52] applied deep learning approaches like ANNs classifiers to various classification challenges. The authors use MLP to identify and categorize Android malware when classifying and predicting gait data. The MLP is executed using a hidden layer of h=3 and sigmoid activation function for the binary classification and h=5 and softmax activation function for the multi-class classification. Learning is assumed to occur at a rate of 0.35. For a high-level overview of how backpropagation works in a neural network, see Figure 4.
4. Experiments
4.1. Evaluation measures and experimental setup
- TPR - Recall: It is calculated by dividing the number of confirmed positive results by the total number of positive results. As illustrated in Eq., it can be estimated by Eq. 9:
- FPR: This metric represents the proportion of false positive cases relative to the total number of true negative cases. The calculation is described by the following Eq. 10:
- Precision is calculated by dividing the number of correct predictions by the total number of correct predictions. It can be calculated by Eq. 11:
- F-measure: It indicates the harmonic mean of precision and recall. Eq. 12 is used to deter-mine this is:
- Accuracy: It is calculated by dividing the number of cases by the sum of the instances that are both true negatives and true positives. Eq. 13 used to determine this is:
- MCC: It is a standard for evaluating the efficacy of binary classifiers. Its numerical value ranges from +1 to -1. Here, a value of +1 indicates an exact prediction, while a value of -1 indicates an opposite forecast. Eq. 14 used to determine this is:
- AUC curve: The F-measure is a crucial indicator of a classification model’s efficacy. It is a quantitative indicator of how easily things can be separated.
4.2. Malware binary detection based on Static features
4.3. Malware category detection based on Static features
4.4. Malware family classification and detection based on Static features selection
4.5. Malware binary detection based on dynamic features selection
4.6. Malware category detection based on dynamic features selection
4.7. Malware family classification and detection based on Dynamic feature selection
4.8. Classification Results Based on hybrid Features
4.9. Comparative analysis
4.10. Feature selection effect on static and dynamic features
5. Conclusion and future work
References
- ODea,S. Smartphone users worldwide.”https://www.statista.com/statistics/330695/number-of-smartphone-users-worldwide/ (accessed 2016-2023).
- Mosa, A. S. M.Yoo, I. and Sheets, L. A systematic review of healthcare applications for smartphones. BMC medical informatics and decision making, 2021, vol. 12, no. 1, pp. 1-31. [CrossRef]
- Taher, F. Elhoseny, M., Hassan, M., brahim, I. and El-Hasnony.V. A Novel Tunicate Swarm Algorithm with Hybrid Deep Learning Enabled Attack Detection for Secure IoT Environment. Published in IEEE Access, 2022, vol. 10, pp. 127192 – 127204. [CrossRef]
- Alzaylaee, M. K. Yerima, S. Y. and Sezer, S. DL-Droid: Deep learning based android malware detection using real devices. Computers & Security, 2020, vol. 89, p. 101663. [CrossRef]
- Dhalaria M. and Gandotra, E. Android malware detection techniques: A literature review. Recent Patents on Engineering,2021, vol. 15, no. 2, pp. 225-245. [CrossRef]
- Wang, X. and Li, . Android malware detection through machine learning on kernel task structures. Neurocomputing,2021, vol. 435, pp. 126-150. [CrossRef]
- Agrawal, P. and Trivedi, B. Machine learning classifiers for Android malware detection. Data Management, Analytics and Innovation: Springer, 2021, pp. 311-322.
- Rajagopal, A. Incident of the week: Malware infects 25m android phone.”https://www.cshub.com/malware/articles/incident-of-the-week-malware-infects-25m-android phones (accessed 2019).
- BBC. “One billion android devices at risk of hacking. https://www.bbc.com/news/technology-51751950 (accessed 2021).
- D. GOODIN. Google play has been spreading advanced android malware for years, 2021.
- Vaas. L. Android malware flytrap hijacks facebook accounts. https://threatpost.com/android-malware-flytrap-facebook/168463/ (accessed 2022).
- Wang, C., Xu, Q., Lin, X., and Liu, S. Research on data mining of permissions mode for Android malware detection. Cluster Computing,2019, vol. 22, no. 6, pp. 13337-13350. [CrossRef]
- Ko, J.-S. , J.-S. Jo, Kim, D.-H., Choi, S.-K. and Kwak, J. Real time android ransomware detection by analyzed android applications. International Conference on Electronics, Information, and Communication (ICEIC), IEEE,2019, pp. 1-5.
- Ideses, I. and Neuberger, A.(2014).Adware detection and privacy control in mobile devices. IEEE 28th Convention of Electrical & Electronics Engineers in Israel, 2014, pp. 1-5.
- Faghihi, F. ,Abadi, M. and Tajoddin, A. Smsbothunter: A novel anomaly detection technique to detect sms botnets. 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), IEEE, 2018, pp. 1-6.
- Sikorski,M. and Honig, A. Practical malware analysis: the hands-on guide to dissecting malicious software. no starch press, 2012.
- Iwendi., C. Keysplitwatermark: Zero watermarking algorithm for software protection against cyber-attacks. IEEE Access, vol. 8, 2020, pp. 72650-72660. [CrossRef]
- Yu, J. and Yamauchi, T. Access control to prevent attacks exploiting vulnerabilities of webview in android OS. IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013: IEEE, pp. 1628-1633.
- Nishimoto, Y., Kajiwara, N., Matsumoto, S., Hori, Y.and Sakurai, K. Detection of android api call using logging mechanism within android framework. International Conference on Security and Privacy in Communication Systems, 2013: Springer, pp. 393-404.
- Song, S., Kim, B. and Lee, S. The effective ransomware prevention technique using process monitoring on android platform. Mobile Information Systems, 2016. [CrossRef]
- Taheri, L., Kadir, A. F. A. and Lashkari, A. H. Extensible android malware detection and family classification using network-flows and API-calls. International Carnahan Conference on Security Technology (ICCST), 2019: IEEE, pp. 1-8.
- Tchakounté, F., Djakene Wandala, A.,and Tiguiane, Y. Detection of android malware based on sequence alignment of permissions. Int. J. Comput.(IJC), 2019, vol. 35, no. 1, pp. 26-36.
- Yuan, Z., Lu, Y.and Xue, Y. Droiddetector: android malware characterization and detection using deep learning. Tsinghua Science and Technology, 2016, vol. 21, no. 1, pp. 114-123.
- “CuckooDroid.” https://cuckoo-droid.readthedocs.io/en/latest/installation/. (accessed).
- Gandotra, E., Bansal, D., and Sofat, S. Malware intelligence: beyond malware analysis. International Journal of Advanced Intelligence Paradigms, 2019, vol. 13, no. 1-2, pp. 80-100.
- Abid, R. Rizwan, M., Veselý, P. , Basharat, A., Tariq, U. and Javed, A. R. Social Networking Security during COVID-19: A Systematic Literature Review. Wireless Communications and Mobile Computing, 2022.
- Lakovic, V. Crisis management of android botnet detection using adaptive neuro-fuzzy inference system. Annals of Data Science, 2020,vol. 7, no. 2, pp. 347-355. [CrossRef]
- Saridou, B. , Rose, J. R. , Shiaeles, S. and Papadopoulos, B. SAGMAD—A Signature Agnostic Malware Detection System Based on Binary Visualisation and Fuzzy Sets. Electronics, 2022, vol. 11, no. 7, p. 1044. [CrossRef]
- Gupta, D. , Ahlawat, A. K. , Sharma, A., and Rodrigues, J. J. Feature selection and evaluation for software usability model using modified moth-flame optimization. Computing, 2020, vol. 102, no. 6, pp. 1503-1520. [CrossRef]
- Sahu, P. C. , Bhoi, S. K. , Jena, N. K. , Sahu, B. K.,and Prusty, R. C. A robust Multi Verse Optimized fuzzy aided tilt Controller for AGC of hybrid Power System. 1st Odisha International Conference on Electrical Power Engineering, Communication and Computing Technology (ODICON), 2021: IEEE, pp. 1-5.
- Rahnamayan, S., Tizhoosh, H. R. , and Salama, M. M. Quasi-oppositional differential evolution. IEEE congress on evolutionary computation, 2007, pp. 2229-2236.
- Strumberger, I. , Bacanin, N., Tuba, M., and Tuba, E. Resource scheduling in cloud computing based on a hybridized whale optimization algorithm. Applied Sciences, 2019, vol. 9, no. 22, p. 4893. [CrossRef]
- Strumberger, I. , Minovic, M., Tuba, M. and Bacanin,N. Performance of elephant herding optimization and tree growth algorithm adapted for node localization in wireless sensor networks. Sensors, vol. 19, no. 11, pp. 2515. [CrossRef]
- Heidari, A. A. , Mirjalili, S. , Faris, H., Aljarah, I., Mafarja, M., and Chen, H. Harris hawks optimization: Algorithm and applications. Future generation computer systems, 2019, vol. 97, pp. 849-872. [CrossRef]
- Lashkari, A. H. , Kadir, A. F. A. , Taheri, L. and Ghorbani, A. A. Toward developing a systematic approach to generate benchmark android malware datasets and classification. International Carnahan Conference on Security Technology (ICCST), 2018: IEEE, pp. 1-7, 2018.
- Parkour, M. Contagio malware database. contagiodump. 2013.
- Virustotal: Virustotal Free Antivirus Scanners. https://support.virustotal.com/hc/en-us/categories/360000160117-About-us (accessed.
- Ahvanooey, M. T. , Li, Q., Rabbani, M. and Rajput, A. R. A survey on smartphones security: software vulnerabilities, malware, and attacks. arXiv preprint arXiv:2001.09406, 2020.
- Liao, Q. Ransomware: a growing threat to SMEs. Conference Southwest Decision Science Institutes,: Southwest Decision Science Institutes USA, pp. 1-7. 2008.
- Gupta, S.(2013). Types of Malware and its Analysis. International Journal of Scientific and Engineering Research, vol. 4, no. 1, 2013, pp. 1-13.
- Hamandi, K. , Chehab, A. , Elhajj, I. H. and Kayssi, A. (2013). Android SMS malware: Vulnerability and mitigation. 27th International Conference on Advanced Information Networking and Applications Workshops, 2013: IEEE, pp. 1004-1009.
- Chizi, B. and Maimon, O. Dimension reduction and feature selection. Data mining and knowledge discovery handbook: Springer, 2009, pp. 83-100.
- Pedregosa, F.. Scikit-learn: Machine learning in Python. the Journal of machine Learning research, vol. 12, 2011, pp. 2825-2830.
- Sapre, S. and Mini, S. Emulous mechanism based multi-objective moth–flame optimization algorithm. Journal of Parallel and Distributed Computing, 2021, vol. 150, pp. 15-33.
- Darrell, T. , Indyk, P. and Shakhnarovich, G. Nearest-neighbor Methods in Learning and Vision: Theory and Practice. MIT Press, 2005.
- Keerthi, S. S. and Gilbert, E. G. (2002). Convergence of a generalized SMO algorithm for SVM classifier design. Machine Learning, vol. 46, no. 1, 2002, pp. 351-360, 2002. [CrossRef]
- Liaw, A. and Wiener, M. Classification and regression by randomForest. R news, vol. 2, no. 3, 2002, pp. 18-22.
- Quinlan, J. R.. Program for machine learning. C4. 5, 1993.
- Domingos, P. and Pazzani, M.(1997).On the optimality of the simple Bayesian classifier under zero-one loss. Machine learning, vol. 29, no. 2, 1997, pp. 103-130. [CrossRef]
- Jiang, J. Android malware family classification based on sensitive opcode sequence. Symposium on Computers and Communications (ISCC), 2019: IEEE, pp. 1-7.
- Abuthawabeh, M. K. A. and Mahmoud, K. W. Android malware detection and categorization based on conversation-level network traffic features. International Arab Conference on Information Technology (ACIT), 2019: IEEE, pp. 42-47.
- Semwal, V. B, Mondal, K. and Nandi, G. C. Robust and accurate feature selection for humanoid push recovery and classification: deep learning approach. Neural Computing and Applications, vol. 28, no. 3,2017, pp. 565-574. [CrossRef]






| PU | Intel(R) Core(TM)i7-2.40 GHz |
| Operating System | Windows 10 Home Single |
| GPU | NVIDIA 1060 |
| RAM | 32 GB |
| Python Version | 3.8 |
| Algorithm | K-NN | SMO | SVM | RF | DT | NB | MLP | Proposed |
|---|---|---|---|---|---|---|---|---|
| Accuracy (%) | 0.923 | 0.935 | 0.923 | 0.958 | 0.950 | 0.942 | 0.935 | 0.969 |
| FPR (%) | 0.071 | 0.064 | 0.077 | 0.049 | 0.056 | 0.069 | 0.058 | 0.029 |
| TPR (%) | 0.917 | 0.933 | 0.924 | 0.966 | 0.957 | 0.957 | 0.926 | 0.967 |
| Precision (%) | 0.917 | 0.925 | 0.908 | 0.942 | 0.933 | 0.917 | 0.933 | 0.967 |
| F-measure (%) | 0.917 | 0.929 | 0.916 | 0.954 | 0.945 | 0.936 | 0.929 | 0.967 |
| MCC (%) | 0.845 | 0.868 | 0.845 | 0.915 | 0.899 | 0.884 | 0.869 | 0.938 |
| AUC (%) | 0.923 | 0.931 | 0.915 | 0.946 | 0.939 | 0.924 | 0.938 | 0.969 |
| Algorithm | K-NN | SMO | SVM | RF | DT | NB | MLP | Proposed |
|---|---|---|---|---|---|---|---|---|
| Accuracy (%) | 0.865 | 0.896 | 0.873 | 0.923 | 0.923 | 0.904 | 0.888 | 0.942 |
| FPR (%) | 0.138 | 0.105 | 0.126 | 0.083 | 0.071 | 0.092 | 0.117 | 0.069 |
| TPR (%) | 0.87 | 0.897 | 0.872 | 0.931 | 0.917 | 0.899 | 0.896 | 0.957 |
| Precision (%) | 0.833 | 0.875 | 0.85 | 0.9 | 0.917 | 0.892 | 0.858 | 0.917 |
| F-measure (%) | 0.851 | 0.886 | 0.861 | 0.915 | 0.917 | 0.895 | 0.877 | 0.936 |
| MCC (%) | - | - | - | - | - | - | - | - |
| AUC (%) | 0.848 | 0.885 | 0.862 | 0.908 | 0.923 | 0.900 | 0.871 | 0.924 |
| Algorithm | K-NN | SMO | SVM | RF | DT | NB | MLP | Proposed |
|---|---|---|---|---|---|---|---|---|
| Accuracy (%) | 0.858 | 0.854 | 0.850 | 0.869 | 0.862 | 0.835 | 0.846 | 0.915 |
| FPR (%) | 0.129 | 0.155 | 0.142 | 0.132 | 0.134 | 0.170 | 0.158 | 0.090 |
| TPR (%) | 0.843 | 0.866 | 0.840 | 0.871 | 0.856 | 0.841 | 0.851 | 0.922 |
| Precision (%) | 0.850 | 0.808 | 0.833 | 0.842 | 0.842 | 0.792 | 0.808 | 0.892 |
| F-measure (%) | 0.846 | 0.836 | 0.837 | 0.856 | 0.849 | 0.815 | 0.829 | 0.907 |
| MCC (%) | - | - | - | - | - | - | - | - |
| AUC (%) | 0.860 | 0.826 | 0.846 | 0.855 | 0.854 | 0.811 | 0.825 | 0.901 |
| Algorithm | K-NN | SMO | SVM | RF | DT | NB | MLP | Proposed |
|---|---|---|---|---|---|---|---|---|
| Accuracy (%) | 0.927 | 0.938 | 0.935 | 0.942 | 0.935 | 0.935 | 0.931 | 0.973 |
| FPR (%) | 0.094 | 0.069 | 0.082 | 0.050 | 0.064 | 0.051 | 0.076 | 0.028 |
| TPR (%) | 0.955 | 0.948 | 0.956 | 0.934 | 0.933 | 0.919 | 0.940 | 0.975 |
| Precision (%) | 0.883 | 0.917 | 0.900 | 0.942 | 0.925 | 0.942 | 0.908 | 0.967 |
| F-measure (%) | 0.918 | 0.932 | 0.927 | 0.938 | 0.929 | 0.930 | 0.924 | 0.971 |
| MCC (%) | 0.854 | 0.876 | 0.869 | 0.884 | 0.868 | 0.869 | 0.861 | 0.946 |
| AUC (%) | 0.895 | 0.924 | 0.909 | 0.946 | 0.931 | 0.945 | 0.916 | 0.969 |
| Algorithm | K-NN | SMO | SVM | RF | DT | NB | MLP | Proposed |
|---|---|---|---|---|---|---|---|---|
| Accuracy (%) | 0.796 | 0.808 | 0.935 | 0.846 | 0.812 | 0.835 | 0.808 | 0.892 |
| FPR (%) | 0.204 | 0.179 | 0.082 | 0.143 | 0.173 | 0.183 | 0.188 | 0.106 |
| TPR (%) | 0.796 | 0.792 | 0.956 | 0.833 | 0.793 | 0.860 | 0.802 | 0.890 |
| Precision (%) | 0.750 | 0.792 | 0.900 | 0.833 | 0.800 | 0.767 | 0.775 | 0.875 |
| F-measure (%) | 0.773 | 0.792 | 0.927 | 0.833 | 0.797 | 0.811 | 0.788 | 0.882 |
| MCC (%) | - | - | - | - | - | - | - | - |
| AUC (%) | 0.773 | 0.807 | 0.909 | 0.845 | 0.814 | 0.792 | 0.794 | 0.885 |
| Algorithm | K-NN | SMO | SVM | RF | DT | NB | MLP | Proposed |
|---|---|---|---|---|---|---|---|---|
| Accuracy (%) | 0.788 | 0.804 | 0.812 | 0.812 | 0.804 | 0.800 | 0.808 | 0.827 |
| FPR (%) | 0.229 | 0.209 | 0.210 | 0.206 | 0.213 | 0.222 | 0.204 | 0.194 |
| TPR (%) | 0.816 | 0.822 | 0.845 | 0.838 | 0.829 | 0.833 | 0.824 | 0.857 |
| Precision (%) | 0.700 | 0.733 | 0.725 | 0.733 | 0.725 | 0.708 | 0.742 | 0.750 |
| F-measure (%) | 0.753 | 0.775 | 0.780 | 0.782 | 0.773 | 0.766 | 0.781 | 0.800 |
| MCC (%) | - | - | - | - | - | - | - | - |
| AUC (%) | 0.735 | 0.762 | 0.757 | 0.763 | 0.756 | 0.743 | 0.769 | 0.778 |
| Algorithm | K-NN | SMO | SVM | RF | DT | NB | MLP | Proposed |
|---|---|---|---|---|---|---|---|---|
| Accuracy (%) | 0.946 | 0.958 | 0.942 | 0.969 | 0.962 | 0.946 | 0.946 | 0.981 |
| FPR (%) | 0.068 | 0.049 | 0.063 | 0.035 | 0.042 | 0.056 | 0.056 | 0.021 |
| TPR (%) | 0.965 | 0.966 | 0.949 | 0.975 | 0.966 | 0.949 | 0.949 | 0.983 |
| Precision (%) | 0.917 | 0.942 | 0.925 | 0.958 | 0.950 | 0.933 | 0.933 | 0.975 |
| F-measure (%) | 0.940 | 0.954 | 0.937 | 0.966 | 0.958 | 0.941 | 0.941 | 0.979 |
| MCC (%) | 0.892 | 0.915 | 0.884 | 0.938 | 0.923 | 0.892 | 0.892 | 0.961 |
| AUC (%) | 0.924 | 0.946 | 0.931 | 0.962 | 0.954 | 0.938 | 0.938 | 0.977 |
| Algorithm | K-NN | SMO | SVM | RF | DT | NB | MLP | Proposed |
|---|---|---|---|---|---|---|---|---|
| Accuracy (%) | 0.946 | 0.915 | 0.919 | 0.946 | 0.942 | 0.923 | 0.931 | 0.969 |
| FPR (%) | 0.068 | 0.096 | 0.101 | 0.063 | 0.063 | 0.095 | 0.082 | 0.042 |
| TPR (%) | 0.965 | 0.930 | 0.946 | 0.957 | 0.949 | 0.946 | 0.947 | 0.983 |
| Precision (%) | 0.917 | 0.883 | 0.875 | 0.925 | 0.925 | 0.883 | 0.900 | 0.950 |
| F-measure (%) | 0.940 | 0.906 | 0.909 | 0.941 | 0.937 | 0.914 | 0.923 | 0.966 |
| MCC (%) | - | - | - | - | - | - | - | - |
| AUC (%) | 0.924 | 0.894 | 0.887 | 0.931 | 0.931 | 0.894 | 0.909 | 0.954 |
| Related work | Precision | Recall |
|---|---|---|
| Abuthawabeh et al. [49] | ||
| Taheri et al. [21] | ||
| Lashkari et al. [45] | ||
| Lashkari et al. [45] | ||
| Abuthawabeh et al. [49] | ||
| DroidDetectMW |
| Related work | Precision | Recall |
|---|---|---|
| Abuthawabeh et al. [49] | 80.2%(RF) | 79.6%(RF) |
| Taheri et al. [21] | 49.9%(RF) | 48.5%(RF) |
| Lashkari et al. [45] | 47.8%(DT) | 45.9%(DN) |
| Lashkari et al. [45] | 49.5%(KNN) | 48%(KNN) |
| Abuthawabeh et al. [49] | 77%(DT) | 77%(DT) |
| DroidDetectMW | 87.5% | 89% |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).