Comparative Analysis of Machine Learning Algorithms for Malware Detection in Android Ecosystems
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.11.02Keywords:
Random Forest, Malware Detection, Machine Learning, Android Ecosystem, Deep LearningDimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Android malware is a growing cybersecurity concern as malicious applications exploit vulnerabilities in the Android operating system to steal sensitive data, disrupt device functionality, or gain unauthorised control. The rising sophistication of these threats makes conventional signature-based detection techniques insufficient, highlighting the need for advanced learning-based solutions that adapt to evolving attack patterns. This study proposes a comparative evaluation of Machine Learning (ML) as well as Deep Learning (DL) models for Android malware detection using the RT-IoT2022 dataset, which contains diverse benign and malicious network traffic. Five models were implemented: Random Forest (RF), Support Vector Machine (SVM), Convolutional Neural Network (CNN), Long Short-Term Memory (LSTM), and a hybrid CNN-LSTM. Experimental analysis showed that while RF and SVM achieved strong baseline results and CNN effectively extracted spatial features, LSTM alone struggled to classify balanced classes. The proposed hybrid CNN–LSTM achieved the best results with 99.30% accuracy and 99.76% F1-score. These findings validate the superiority of hybrid architectures and provide a pathway for lightweight, real-time, and adversarial-resistant malware detection systems for Android and Internet of Things (IoT) environments.Abstract
How to Cite
Downloads
Similar Articles
- Mallamma V. Reddy, Sachhidanand Sidramappa, Digitization and Recognition of Kannada Inscription Dynasty , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- Viji Parthasarathy, Manikandasaran S S, Feature Selection Techniques for IOT Crop Yield Prediction Using Smart Farming Sensor Data , The Scientific Temper: Vol. 17 No. 01 (2026): The Scientific Temper
- Vimala S, G. Arockia Sahaya Sheela, Label-Aware Imputation with Cluster Refinement for Smartphone Usage Analytics in Educational Institutions , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
- C. Muruganandam, V. Maniraj, A Self-driven dual reinforcement model with meta heuristic framework to conquer the iot based clustering to enhance agriculture production , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Muhammed Jouhar K. K., K. Aravinthan, A bigdata analytics method for social media behavioral analysis , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Jayalakshmi K., M. Prabakaran, Feature selection in HR analytics: A hybrid optimization approach with PSO and GSO , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Samara Ahmed, Adil E. Rajput, Denial, acceptance and intervention in society regarding female workplace bullying - A mental health study on social media , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- L. Amudavalli, K. Muthuramalingam, Energy-efficient location-based routing protocol for wireless sensor networks using teaching-learning soccer league optimization (TLSLO) , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- S. Prabagar, Vinay K. Nassa, Senthil V. M, Shilpa Abhang, Pravin P. Adivarekar, Sridevi R, Python-based social science applications’ profiling and optimization on HPC systems using task and data parallelism , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- A. Jafar Ali, Dr.G. Ravi, D.I. George Amalarethinam, AI-Driven Swarm-Optimized Adaptive Routing Using Quantum-Inspired Neural Scheduling with Homomorphic Encryption , The Scientific Temper: Vol. 17 No. 02 (2026): The Scientific Temper
<< < 14 15 16 17 18 19 20 21 22 23 > >>
You may also start an advanced similarity search for this article.

