Comparative Analysis of Machine Learning Algorithms for Malware Detection in Android Ecosystems
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.11.02Keywords:
Random Forest, Malware Detection, Machine Learning, Android Ecosystem, Deep LearningDimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Android malware is a growing cybersecurity concern as malicious applications exploit vulnerabilities in the Android operating system to steal sensitive data, disrupt device functionality, or gain unauthorised control. The rising sophistication of these threats makes conventional signature-based detection techniques insufficient, highlighting the need for advanced learning-based solutions that adapt to evolving attack patterns. This study proposes a comparative evaluation of Machine Learning (ML) as well as Deep Learning (DL) models for Android malware detection using the RT-IoT2022 dataset, which contains diverse benign and malicious network traffic. Five models were implemented: Random Forest (RF), Support Vector Machine (SVM), Convolutional Neural Network (CNN), Long Short-Term Memory (LSTM), and a hybrid CNN-LSTM. Experimental analysis showed that while RF and SVM achieved strong baseline results and CNN effectively extracted spatial features, LSTM alone struggled to classify balanced classes. The proposed hybrid CNN–LSTM achieved the best results with 99.30% accuracy and 99.76% F1-score. These findings validate the superiority of hybrid architectures and provide a pathway for lightweight, real-time, and adversarial-resistant malware detection systems for Android and Internet of Things (IoT) environments.Abstract
How to Cite
Downloads
Similar Articles
- T. V. SATHE, BIODIVERSITY OF ICHNEUMONID FLIES (HYMENOPTERA : ICHNEUMONIDAE) FROM WESTERN GHATS, MAHARASHTRA , The Scientific Temper: Vol. 3 No. 1&2 (2012): The Scientific Temper
- R. Prabhu, P. Archana, S. Anusooya, P. Anuradha, Improved Steganography for IoT Network Node Data Security Promoting Secure Data Transmission using Generative Adversarial Networks , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Manisha Anil Vhora, Vidya Bhandwalkar, Prashant Mangesh Rege, AI-driven HR analytics: Enhancing decision-making in workforce planning , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Neerav Nishant, Nisha Rathore, Vinay Kumar Nassa, Vijay Kumar Dwivedi, Thulasimani T, Surrya Prakash Dillibabu, Integrating machine learning and mathematical programming for efficient optimization of electric discharge machining technique , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- M. Balamurugan, A. Bharathiraja, An enhanced hybrid GCNN-MHA-GRU approach for symptom-to-medicine recommendation by utilizing textual analysis of customer reviews , The Scientific Temper: Vol. 16 No. 06 (2025): The Scientific Temper
- Prakash Lakhani, Premasish Roy, Souren Koner, Deepa Nair, D. Patil, Mona Sinha, Exploring the influence of work-life balance on employee engagement in Mumbai’s real estate industry , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Amita Gupta, A study of the scientific approach inherited in the Indian knowledge system (IKS) , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Nandini S, Nagabushanam M, Nandeesh G S, Sundaresha M P, Pramodkumar S, Segmentation of Brain Tumor from Magnetic Resonance Imaging using Handcrafted Features with BOA-based Transformer , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- Rupesh Mandal, Bobby Sharma, Dibyajyoti Chutia , Smart flood monitoring in Guwahati city: A LoRa-based AIoT and edge computing sensor framework , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Sruthy M.S, R. Suganya, An efficient key establishment for pervasive healthcare monitoring , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
<< < 13 14 15 16 17 18 19 20 21 22 > >>
You may also start an advanced similarity search for this article.

