Hybrid Android Malware Detection: A Review of Heuristic-Based Approach

被引:3
|
作者
Yunmar, Rajif Agung [1 ,2 ]
Kusumawardani, Sri Suning [1 ]
Mohsen, Fadi [1 ,3 ]
机构
[1] Univ Gadjah Mada, Dept Elect & Informat Engn, Yogyakarta 55223, Indonesia
[2] Inst Teknol Sumatera, Dept Informat Engn, Jati Agung 35365, South Lampung R, Indonesia
[3] Univ Groningen, Dept Comp Sci, NL-9712 CP Groningen, Netherlands
关键词
Android malware; heuristic-based detection; hybrid approach; DETECTION SYSTEM; TAXONOMY;
D O I
10.1109/ACCESS.2024.3377658
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the last decade, numerous research efforts have been dedicated to countering malicious mobile applications. Given its market share, Android OS has been the primary target for most of these apps. Researchers have devised numerous solutions to protect Android devices and their users, categorizing them into static and dynamic approaches. Each of these approaches has its own advantages and disadvantages. The hybrid approach aims to combine the benefits of both. This study closely examines the hybrid solutions proposed between 2012 and 2023, highlighting their strengths and limitations. The objective of this study is to provide a comprehensive review of existing research on Android malware detection using a hybrid approach. Our review identifies several issues related to hybrid detection approaches, including datasets, feature utilization and selection, working environments, detection order mechanisms, integrity of the detection step, detection algorithms, and the use of automated input generation. Key findings of this study include: (i) the majority of studies have not adequately addressed on-device detection and have overlooked the importance of system usability, (ii) many studies rely on outdated datasets that do not accurately represent the current threat landscape, (iii) there is a need for a methodology to detect zero-day attacks, and (iv) most research has not paid attention to the impact of automated input generation on malware behavior and code coverage. We also discuss some open issues and future directions that will help substantiate the hybrid approach study.
引用
收藏
页码:41255 / 41286
页数:32
相关论文
共 50 条
  • [31] A Hybrid Analysis-Based Approach to Android Malware Family Classification
    Ding, Chao
    Luktarhan, Nurbol
    Lu, Bei
    Zhang, Wenhui
    ENTROPY, 2021, 23 (08)
  • [32] Android Malware Detection Using Hybrid Meta-heuristic Feature Selection and Ensemble Learning Techniques
    Bhagwat, Sakshi
    Gupta, Govind P.
    ADVANCES IN COMPUTING AND DATA SCIENCES (ICACDS 2022), PT I, 2022, 1613 : 145 - 156
  • [33] A Two-Tier Fuzzy Meta-Heuristic Hybrid Optimization for Dynamic Android Malware Detection
    Santosh Jhansi K.
    Chakravarty S.
    Ravi Kiran Varma P.
    SN Computer Science, 4 (2)
  • [34] Category Based Malware Detection for Android
    Grampurohit, Vijayendra
    Kumar, Vijay
    Rawat, Sanjay
    Rawat, Shatrunjay
    SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 239 - 249
  • [35] ONAMD: AN ONLINE ANDROID MALWARE DETECTION APPROACH
    Riasat, Rubata
    Sakeena, Muntaha
    Sadiq, Abdul Hannan
    Wang, Yong-Ji
    PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC), VOL 1, 2018, : 190 - 196
  • [36] A Fast Approach Towards Android Malware Detection
    Chi, Hongmei
    Simms, Xavier
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2015, PT I, 2015, 9155 : 77 - 89
  • [37] Android Malware Detection: An Eigenspace Analysis Approach
    Yerima, Suleiman Y.
    Sezer, Sakir
    Muttik, Igor
    2015 SCIENCE AND INFORMATION CONFERENCE (SAI), 2015, : 1236 - 1242
  • [38] Android malware detection techniques: A literature review
    Dhalaria M.
    Gandotra E.
    Recent Patents on Engineering, 2021, 15 (02) : 225 - 245
  • [39] Android malware analysis and detection: A systematic review
    Dahiya, Anuradha
    Singh, Sukhdip
    Shrivastava, Gulshan
    EXPERT SYSTEMS, 2025, 42 (01)
  • [40] A Robust Malware Detection Approach for Android System Based on Ensemble Learning
    Li, Wenjia
    Cai, Juecong
    Wang, Zi
    Cheng, Sihua
    UBIQUITOUS SECURITY, 2022, 1557 : 309 - 321