Comparative Analysis of Machine Learning Algorithms for Malware Detection in Android Ecosystems
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.11.02Keywords:
Random Forest, Malware Detection, Machine Learning, Android Ecosystem, Deep LearningDimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Android malware is a growing cybersecurity concern as malicious applications exploit vulnerabilities in the Android operating system to steal sensitive data, disrupt device functionality, or gain unauthorised control. The rising sophistication of these threats makes conventional signature-based detection techniques insufficient, highlighting the need for advanced learning-based solutions that adapt to evolving attack patterns. This study proposes a comparative evaluation of Machine Learning (ML) as well as Deep Learning (DL) models for Android malware detection using the RT-IoT2022 dataset, which contains diverse benign and malicious network traffic. Five models were implemented: Random Forest (RF), Support Vector Machine (SVM), Convolutional Neural Network (CNN), Long Short-Term Memory (LSTM), and a hybrid CNN-LSTM. Experimental analysis showed that while RF and SVM achieved strong baseline results and CNN effectively extracted spatial features, LSTM alone struggled to classify balanced classes. The proposed hybrid CNN–LSTM achieved the best results with 99.30% accuracy and 99.76% F1-score. These findings validate the superiority of hybrid architectures and provide a pathway for lightweight, real-time, and adversarial-resistant malware detection systems for Android and Internet of Things (IoT) environments.Abstract
How to Cite
Downloads
Similar Articles
- Olivia C. Gold, Jayasimman Lawrence, Ensemble of CatBoost and neural networks with hybrid feature selection for enhanced heart disease prediction , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- R. Mercy, T. Lucia Agnes Beena, CATSEM: A Climate-Aware Time-Series Ensemble Model for Enhanced Paddy Yield Prediction , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
- P Janavarthini, I Antonitte Vinoline, Sustainable fuzzy inventory for concurrent fabrication and material depletion modeling with random substandard items , The Scientific Temper: Vol. 16 No. 04 (2025): The Scientific Temper
- Nilesh Anute, Geetali Tilak, Revolutionizing e-Learning with AR, VR, And AI , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- A. Rukmani, C. Jayanthi, Fuzzy optimization trust aware clustering approach for the detection of malicious node in the wireless sensor networks , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Afroz Alam, Krishna Kumar Rawat, Praveen Kumar Verma, Sonu Yadav, Bryodiversity of Eastern Ghats (India) , The Scientific Temper: Vol. 7 No. 1&2 (2016): THE SCIENTIFIC TEMPER
- Teklil Abadeye, Teshome Yitbarek, Isreal Zewide, Kibinesh Adimasu, Assessing soil fertility influenced by land use in Moche, Gurage Zone, Ethiopia , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- Priya Thapliyal, Pallavi Dheer, Satish Chandra Nautiyal, Rajesh Rayal, Rakesh Rai, Indra Rautela, Comparative Study of Fast Plaque Assay and Real Time PCR for Detection of Mycobacterium tuberculosis in Pulmonary Samples , The Scientific Temper: Vol. 12 No. 1&2 (2021): The Scientific Temper
- Dinesh Kumar Verma, Ruchi Tripathi, Vijai Krishna Dsa, Rakesh Kumar Pandey, Histopathological Changes in Liver and Kidney of Heteropneustes fossilis (Bloch) on Chlorpyrifos Exposure , The Scientific Temper: Vol. 11 No. 1&2 (2020): The Scientific Temper
- Raja Selvaraj, Manikandasaran S. Sundari, EAM: Enhanced authentication method to ensure the authenticity and integrity of the data in VM migration to the cloud environment , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
<< < 17 18 19 20 21 22 23 24 25 26 > >>
You may also start an advanced similarity search for this article.

