AMalLSTM: ANDROID MALWARE DETECTION USING LSTM

Authors

  • Mehwish Aslam Department of Computer Science, NFCIET, Multan, Pakistan. Author
  • Ahmad Naeem Department of Computer Science, NFCIET, Multan, Pakistan. Author
  • Ahmad Sarfraz Department of Computer Science, NFCIET, Multan, Pakistan. Author
  • Muhammad Kamran Abid Department of Computer Science, NFCIET, Multan, Pakistan. Author
  • Yasir Aziz Department of Computer Engineering, BZU, Multan, Pakistan. Author
  • Naeem Aslam Department of Computer Science, NFCIET, Multan, Pakistan. Author
  • Muhammad Fuzail Department of Computer Science, NFCIET, Multan, Pakistan. Author

DOI:

https://doi.org/10.71146/kjmr333

Keywords:

Android malware detection, deep learning model, malware classifier, AMalLSTM

Abstract

Android smartphone apps are becoming increasingly popular, but their security is a concern. Malware can cause damage to mobile devices and servers. Developing detection technologies to avoid attacks is crucial for protecting consumers' mobile devices, desktops, and servers. The goal of this study is to avoid malware attacks, which are addressed via static, dynamic and hybrid features. Combating such attacks requires effective malware detection tools. The framework restricts the deep learning architecture in order to find dependencies between APK-retrieved attributes. To examine the performance and robustness of our proposed system, we conducted a comprehensive experimental investigation that included machine learning and deep learning approaches. This study assesses the efficiency of LSTM for identifying Android malware appears in time-varying sequences of healthy and infected apps. To evaluate the AMalLSTM model, a set of malicious and benign Android applications, along with their package files containing features such as API calls, system call sequences, opcode sequences and permissions, are used. Nevertheless, the dataset has a balanced malware set for different types, but it does not cover the whole nature of Android malware and available tooling for producing new threats. Android malware classification accuracy is evaluated by means of deep learning models trained on the AMalLSTM framework. It works well on classification accuracy at low false positive and positive false negatives, thus being more favourable towards evasive virus tactics. The results demonstrate that the proposed approach exceeds earlier algorithms with detection accuracy: 98.4%, precision: 98.5%, recall: 97.2%, and F1 measure: 97.8%.Our future study is to apply LSTM network topologies to genuine Android malware samples, rather than static permissions or profiled program attributes.

Downloads

Download data is not yet available.

Downloads

Published

2025-03-09

Issue

Section

Engineering and Technology

How to Cite

AMalLSTM: ANDROID MALWARE DETECTION USING LSTM. (2025). Kashf Journal of Multidisciplinary Research, 2(03), 61-73. https://doi.org/10.71146/kjmr333

Most read articles by the same author(s)

Similar Articles

1-10 of 99

You may also start an advanced similarity search for this article.