Comparative Analysis of Machine Learning Algorithms for Malware Detection in Android Ecosystems
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.11.02Keywords:
Random Forest, Malware Detection, Machine Learning, Android Ecosystem, Deep LearningDimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Android malware is a growing cybersecurity concern as malicious applications exploit vulnerabilities in the Android operating system to steal sensitive data, disrupt device functionality, or gain unauthorised control. The rising sophistication of these threats makes conventional signature-based detection techniques insufficient, highlighting the need for advanced learning-based solutions that adapt to evolving attack patterns. This study proposes a comparative evaluation of Machine Learning (ML) as well as Deep Learning (DL) models for Android malware detection using the RT-IoT2022 dataset, which contains diverse benign and malicious network traffic. Five models were implemented: Random Forest (RF), Support Vector Machine (SVM), Convolutional Neural Network (CNN), Long Short-Term Memory (LSTM), and a hybrid CNN-LSTM. Experimental analysis showed that while RF and SVM achieved strong baseline results and CNN effectively extracted spatial features, LSTM alone struggled to classify balanced classes. The proposed hybrid CNN–LSTM achieved the best results with 99.30% accuracy and 99.76% F1-score. These findings validate the superiority of hybrid architectures and provide a pathway for lightweight, real-time, and adversarial-resistant malware detection systems for Android and Internet of Things (IoT) environments.Abstract
How to Cite
Downloads
Similar Articles
- T. Malathi, T. Dheepak, Enhanced regression method for weather forecasting , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Shantanu Kanade, Anuradha Kanade, Secure degree attestation and traceability verification based on zero trust using QP-DSA and RD-ECC , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
- Gourav Kalra, Arun Kumar Gupta, Multi-response Optimization of Machining Parameters in Inconel 718 End Milling Process Through RSM-MOGA , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper
- Gomathi P, Deena Rose D, Sampath Kumar R, Sathya Priya M, Dinesh S, Ramarao M, Computer vision for unmanned aerial vehicles in agriculture: applications, challenges, and opportunities , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- V. Infine Sinduja, P. Joesph Charles, A hybrid approach using attention bidirectional gated recurrent unit and weight-adaptive sparrow search optimization for cloud load balancing , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper
- Kanthalakshmi S, Nikitha M. S, Pradeepa G, Classification of weld defects using machine vision using convolutional neural network , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- Annalakshmi D, C. Jayanthi, A secured routing algorithm for cluster-based networks, integrating trust-aware authentication mechanisms for energy-efficient and efficient data delivery , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- M. Prabhu, A. Chandrabose, Optimization based energy aware scheduling in wireless sensor networks , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Mohiyuddeen Hafzal, Gayathri B.J., M. Meghana Shet, Shaping the future: Education and skill development for Viksit Bharat@2047 , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
- Maheshbhai R. Jakhotra, Sanjay Gupta, A Study on the Design and Effectiveness of a Spoken English Program for Gujarati Medium Secondary School Students (Aged 14–15) , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
<< < 20 21 22 23 24 25 26 27 28 29 > >>
You may also start an advanced similarity search for this article.

