Comparative Analysis of Machine Learning Algorithms for Malware Detection in Android Ecosystems
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.11.02Keywords:
Random Forest, Malware Detection, Machine Learning, Android Ecosystem, Deep LearningDimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Android malware is a growing cybersecurity concern as malicious applications exploit vulnerabilities in the Android operating system to steal sensitive data, disrupt device functionality, or gain unauthorised control. The rising sophistication of these threats makes conventional signature-based detection techniques insufficient, highlighting the need for advanced learning-based solutions that adapt to evolving attack patterns. This study proposes a comparative evaluation of Machine Learning (ML) as well as Deep Learning (DL) models for Android malware detection using the RT-IoT2022 dataset, which contains diverse benign and malicious network traffic. Five models were implemented: Random Forest (RF), Support Vector Machine (SVM), Convolutional Neural Network (CNN), Long Short-Term Memory (LSTM), and a hybrid CNN-LSTM. Experimental analysis showed that while RF and SVM achieved strong baseline results and CNN effectively extracted spatial features, LSTM alone struggled to classify balanced classes. The proposed hybrid CNN–LSTM achieved the best results with 99.30% accuracy and 99.76% F1-score. These findings validate the superiority of hybrid architectures and provide a pathway for lightweight, real-time, and adversarial-resistant malware detection systems for Android and Internet of Things (IoT) environments.Abstract
How to Cite
Downloads
Similar Articles
- T. Ramyaveni, V. Maniraj, Hyperparameter tuning of diabetes prediction using machine learning algorithm with pelican optimization algorithm , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Abhishek Pandey, V Ramesh, Puneet Mittal, Suruthi, Muniyandy Elangovan, G.Deepa, Exploring advancements in deep learning for natural language processing tasks , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Kinjal K. Patel, Kiran Amin, Predictive modeling of dropout in MOOCs using machine learning techniques , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- V. Karthikeyan, C. Jayanthi, Advancements in image quality assessment: a comparative study of image processing and deep learning techniques , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Shaik Khaleel Ahamed, Neerav Nishant, Ayyakkannu Selvaraj, Nisarg Gandhewar, Srithar A, K.K.Baseer, Investigating privacy-preserving machine learning for healthcare data sharing through federated learning , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- R. Sakthiraman, L. Arockiam, RFSVMDD: Ensemble of multi-dimension random forest and custom-made support vector machine for detecting RPL DDoS attacks in an IoT-based WSN environment , The Scientific Temper: Vol. 16 No. 03 (2025): The Scientific Temper
- Sathya R., Balamurugan P, Classification of glaucoma in retinal fundus images using integrated YOLO-V8 and deep CNN , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- P. S. Dheepika, V. Umadevi, An optimized approach for detection and mitigation of DDoS attack cloud using an ensembled deep learning approach , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- V Anitha, Seema Sharma, R. Jayavadivel, Akundi Sai Hanuman, B Gayathri, R. Rajagopal, A network for collaborative detection of intrusions in smart cities using blockchain technology , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- N. Saranya, M. Kalpana Devi, A. Mythili, Summia P. H, Data science and machine learning methods for detecting credit card fraud , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
<< < 1 2 3 4 5 6 7 8 9 10 > >>
You may also start an advanced similarity search for this article.

