Volume no :
9 |Issue no :
1Article Type :
Scholarly ArticleAuthor :
K.Kanishk Kumar, P Rithvik Reddy, S Saikumar ReddyPublished Date :
April, 2025Publisher :
Journal of Theoretical and Computational Advances in Scientific Research (JTCASR)
Page No: 1 - 12
Abstract : The rapid growth of Android smartphones has led to an exponential increase in the distribution and usage of Android applications. However, this popularity has also attracted cybercriminals who exploit the platform by developing malware to compromise user data, privacy, and device security. Traditional signature-based malware detection techniques are often ineffective against new and evolving threats, necessitating more advanced methods. Machine learning (ML) has emerged as a promising solution to enhance Android malware detection by leveraging data-driven algorithms that can identify malicious behavior patterns and anomalies. This study explores the application of various machine learning models, such as decision trees, support vector machines, random forests, and neural networks, for detecting malware on Android devices. Features extracted from application metadata, permissions, API calls, and behavioral characteristics are used to train and evaluate these models. The results demonstrate that machine learning approaches significantly improve detection accuracy, reduce false positives, and can adapt to novel malware variants through continuous learning. Furthermore, the integration of ML-based detection systems into Android security frameworks provides real-time protection and automated threat analysis. Challenges such as feature selection, data imbalance, and resource constraints on mobile devices are also discussed. This research highlights the potential of machine learning as an effective tool in combating Android malware, promoting safer mobile environments for users and developers alike.
Keyword Android malware detection, machine learning, mobile security, anomaly detection, application permissions, feature extraction, classification algorithms, real-time threat analysis, mobile device security, malware classification.
Reference:
- Reddy, C. N. K., & Murthy, G. V. (2012). Evaluation of Behavioral Security in Cloud Computing. International Journal of Computer Science and Information Technologies, 3(2), 3328-3333.
- Murthy, G. V., Kumar, C. P., & Kumar, V. V. (2017, December). Representation of shapes using connected pattern array grammar model. In 2017 IEEE Region 10 Humanitarian Technology Conference (R10-HTC)(pp. 819-822). IEEE.
- Krishna, K. V., Rao, M. V., & Murthy, G. V. (2017). Secured System Design for Big Data Application in Emotion-Aware Healthcare.
- Rani, G. A., Krishna, V. R., & Murthy, G. V. (2017). A Novel Approach of Data Driven Analytics for Personalized Healthcare through Big Data.
- Rao, M. V., Raju, K. S., Murthy, G. V., & Rani, B. K. (2020). Configure and Management of Internet of Things. Data Engineering and Communication Technology, 163.
- Ramakrishna, C., Kumar, G. K., Reddy, A. M., & Ravi, P. (2018). A Survey on various IoT Attacks and its Countermeasures. International Journal of Engineering Research in Computer Science and Engineering (IJERCSE), 5(4), 143-150.
- Madar, B., Kumar, G. K., & Ramakrishna, C. (2017). Captcha breaking using segmentation and morphological operations. International Journal of Computer Applications, 166(4), 34-38.
- Ramakrishna, C., Kumar, G. S., & Reddy, P. C. S. (2021). Quadruple band-notched compact monopole UWB antenna for wireless applications. Journal of Electromagnetic Engineering and Science, 21(5), 406-416.
- Manivasagan, S., Kumar, G. S. R. S., & Joon, M. S. (2006). Qualitative changes in karonda (Carissa carandas Linn.) candy during storage at room temperature. Haryana Journal of Horticultural Sciences, 35(1/2), 19.
- Kumar, G. K., Kumar, B. K., Boobalan, G., Kumar, C. S., & Reddy, A. G. (2015). Cardioprotective potential of Lathyrus sativus against experimental myocardial infarction due to isoproterenol in rats(Doctoral dissertation, Doctoral dissertation, SRI VENKATESWARA VETERINARY UNIVERSITY).
- Chithanuru, V., & Ramaiah, M. (2023). An anomaly detection on blockchain infrastructure using artificial intelligence techniques: Challenges and future directions–A review. Concurrency and Computation: Practice and Experience, 35(22), e7724.
- Ramaiah, M., Chithanuru, V., Padma, A., & Ravi, V. (2022). A review of security vulnerabilities in industry 4.0 application and the possible solutions using blockchain. Cyber Security Applications for Industry 4.0, 63-95.
- Padma, A., Chithanuru, V., Uppamma, P., & VishnuKumar, R. (2024). Exploring Explainable AI in Healthcare: Challenges and Future Directions. In Analyzing Explainable AI in Healthcare and the Pharmaceutical Industry(pp. 199-233). IGI Global.
- Ramaiah, M., Padma, A., Vishnukumar, R., Rahamathulla, M. Y., & Chithanuru, V. (2024, May). A hybrid wrapper technique enabled Network Intrusion Detection System for Software defined networking based IoT networks. In 2024 3rd International Conference on Artificial Intelligence For Internet of Things (AIIoT)(pp. 1-6). IEEE.
- Chithanuru, V., & Ramaiah, M. (2025). Proactive detection of anomalous behavior in Ethereum accounts using XAI-enabled ensemble stacking with Bayesian optimization. PeerJ Computer Science, 11, e2630.
- Prashanth, J. S., & Nandury, S. V. (2015, June). Cluster-based rendezvous points selection for reducing tour length of mobile element in WSN. In 2015 IEEE International Advance Computing Conference (IACC)(pp. 1230-1235). IEEE.
- Prashanth, J. S., & Nandury, S. V. (2019). A Cluster—based Approach for Minimizing Energy Consumption by Reducing Travel Time of Mobile Element in WSN. International Journal of Computers Communications & Control, 14(6), 691-709.
- Kumar, K. A., Pabboju, S., & Desai, N. M. S. (2014). Advance text steganography algorithms: an overview. International Journal of Research and Applications, 1(1), 31-35.
- Shyam, D. N. M., & Hussain, M. A. (2023). Mutual authenticated key agreement in Wireless Infrastructure-less network by Chaotic Maps based Diffie-Helman Property. Fusion: Practice & Applications, 13(2).
- Shyam, D. N. M., & Hussain, M. A. (2023). A Naive Bayes-Driven Mechanism for Mitigating Packet-Dropping Attacks in Autonomous Wireless Networks. Ingenierie des Systemes d’Information, 28(4), 1019.
- Hnamte, V., & Balram, G. (2022). Implementation of Naive Bayes Classifier for Reducing DDoS Attacks in IoT Networks. Journal of Algebraic Statistics, 13(2), 2749-2757.
- Balram, G., Anitha, S., & Deshmukh, A. (2020, December). Utilization of renewable energy sources in generation and distribution optimization. In IOP Conference Series: Materials Science and Engineering(Vol. 981, No. 4, p. 042054). IOP Publishing.
- Subrahmanyam, V., Sagar, M., Balram, G., Ramana, J. V., Tejaswi, S., & Mohammad, H. P. (2024, May). An Efficient Reliable Data Communication For Unmanned Air Vehicles (UAV) Enabled Industry Internet of Things (IIoT). In 2024 3rd International Conference on Artificial Intelligence For Internet of Things (AIIoT)(pp. 1-4). IEEE.
- Mahammad, F. S., Viswanatham, V. M., Tahseen, A., Devi, M. S., & Kumar, M. A. (2024, July). Key distribution scheme for preventing key reinstallation attack in wireless networks. In AIP Conference Proceedings(Vol. 3028, No. 1). AIP Publishing.
- Tahseen, A., Shailaja, S. R., & Ashwini, Y. (2024). Extraction for Big Data Cyber Security Analytics. Advances in Computational Intelligence and Informatics: Proceedings of ICACII 2023, 993, 365.
- Tahseen, A., Shailaja, S. R., & Ashwini, Y. (2023, December). Security-Aware Information Classification Using Attributes Extraction for Big Data Cyber Security Analytics. In International Conference on Advances in Computational Intelligence and Informatics(pp. 365-373). Singapore: Springer Nature Singapore.
- Lavanya, P. (2024). Personalized Medicine Recommendation System Using Machine Learning.
- Lavanya, P. (2024). In-Cab Smart Guidance and support system for Dragline operator.
- Lavanya, P. (2024). Price Comparison of GeM Products with other eMarketplaces.
- Kovoor, M., Durairaj, M., Karyakarte, M. S., Hussain, M. Z., Ashraf, M., & Maguluri, L. P. (2024). Sensor-enhanced wearables and automated analytics for injury prevention in sports. Measurement: Sensors, 32, 101054.
- Rao, N. R., Kovoor, M., Kishor Kumar, G. N., & Parameswari, D. V. L. (2023). Security and privacy in smart farming: challenges and opportunities. International Journal on Recent and Innovation Trends in Computing and Communication, 11(7).
- Madhuri, K. (2023). Security Threats and Detection Mechanisms in Machine Learning. Handbook of Artificial Intelligence, 255.
- Madhuri, K., Viswanath, N. K., & Gayatri, P. U. (2016, November). Performance evaluation of AODV under Black hole attack in MANET using NS2. In 2016 international conference on ICT in Business Industry & Government (ICTBIG)(pp. 1-3). IEEE.
- Reddy, P. R. S., Bhoga, U., Reddy, A. M., & Rao, P. R. (2017). OER: Open Educational Resources for Effective Content Management and Delivery. Journal of Engineering Education Transformations, 30(3), 322-326.
- Reddy, P. R. S., & Ravindranath, K. (2024). Enhancing Secure and Reliable Data Transfer through Robust Integrity. Journal of Electrical Systems, 20, 900-910.
- REDDY, P. R. S., & RAVINDRANATH, K. (2022). A HYBRID VERIFIED RE-ENCRYPTION INVOLVED PROXY SERVER TO ORGANIZE THE GROUP DYNAMICS: SHARING AND REVOCATION. Journal of Theoretical and Applied Information Technology, 100(13).
- Reddy, B. A., & Reddy, P. R. S. (2012). Effective data distribution techniques for multi-cloud storage in cloud computing. CSE, Anurag Group of Institutions, Hyderabad, AP, India.
- Raj, R. S., & Raju, G. P. (2014, December). An approach for optimization of resource management in Hadoop. In International Conference on Computing and Communication Technologies(pp. 1-5). IEEE.
- Reddy, P. R. S., Bhoga, U., Reddy, A. M., & Rao, P. R. (2017). OER: Open Educational Resources for Effective Content Management and Delivery. Journal of Engineering Education Transformations, 30(3), 322-326.
- Ramana, A. V., Bhoga, U., Dhulipalla, R. K., Kiran, A., Chary, B. D., & Reddy, P. C. S. (2023, June). Abnormal Behavior Prediction in Elderly Persons Using Deep Learning. In 2023 International Conference on Computer, Electronics & Electrical Engineering & their Applications (IC2E3)(pp. 1-5). IEEE.
- Ujwala, B., & Reddy, P. R. S. (2016). An effective mechanism for integrity of data sanitization process in the cloud. European Journal of Advances in Engineering and Technology, 3(8), 82-84.
- Rani, K. P., Reddy, Y. S., Sreedevi, P., Dastagiraiah, C., Shekar, K., & Rao, K. S. (2024, June). Tracking The Impact of PM Poshan on Child’s Nutritional Status. In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)(pp. 1-4). IEEE.
- Yakoob, S., Krishna Reddy, V., & Dastagiraiah, C. (2017). Multi User Authentication in Reliable Data Storage in Cloud. In Computer Communication, Networking and Internet Security: Proceedings of IC3T 2016(pp. 531-539). Springer Singapore.
- Sukhavasi, V., Kulkarni, S., Raghavendran, V., Dastagiraiah, C., Apat, S. K., & Reddy, P. C. S. (2024). Malignancy Detection in Lung and Colon Histopathology Images by Transfer Learning with Class Selective Image Processing.
- Mahalakshmi, A., Goud, N. S., & Murthy, G. V. (2018). A survey on phishing and it’s detection techniques based on support vector method (Svm) and software defined networking (sdn). International Journal of Engineering and Advanced Technology, 8(2), 498-503.
- Swapna Goud, N., & Mathur, A. (2019). A certain investigations on web security threats and phishing website detection techniques. International Journal of Advanced Science and Technology, 28(16), 871-879.
- Swapna, N. (2017). „Analysis of Machine Learning Algorithms to Protect from Phishing in Web Data Mining‟. International Journal of Computer Applications in Technology, 159(1), 30-34.
- SAIPRASANNA, S., GOUD, N. S., & MURTHY, G. V. (2021). ENHANCED RECURRENT CONVOLUTIONAL NEURAL NETWORKS BASED EMAIL PHISHING DETECTION. Elementary Education Online, 20(5), 5970-5970.
- Balakrishna, G., Kumar, A., Younas, A., Kumar, N. M. G., & Rastogi, R. (2023, October). A novel ensembling of CNN-A-LSTM for IoT electric vehicle charging stations based on intrusion detection system. In 2023 International Conference on Self Sustainable Artificial Intelligence Systems (ICSSAS)(pp. 1312-1317). IEEE.
- Moparthi, N. R., Bhattacharyya, D., Balakrishna, G., & Prashanth, J. S. (2021). Paddy leaf disease detection using CNN.
- Balakrishna, G., & Babu, C. S. (2013). Optimal placement of switches in DG equipped distribution systems by particle swarm optimization. International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, 2(12), 6234-6240.
- Moparthi, N. R., Sagar, P. V., & Balakrishna, G. (2020, July). Usage for inside design by AR and VR technology. In 2020 7th International Conference on Smart Structures and Systems (ICSSS)(pp. 1-4). IEEE.
- Amarnadh, V., & Moparthi, N. R. (2024). Prediction and assessment of credit risk using an adaptive Binarized spiking marine predators’ neural network in financial sector. Multimedia Tools and Applications, 83(16), 48761-48797.
- Amarnadh, V., & Moparthi, N. R. (2023). Comprehensive review of different artificial intelligence-based methods for credit risk assessment in data science. Intelligent Decision Technologies, 17(4), 1265-1282.
- Amarnadh, V., & Moparthi, N. (2023). Data Science in Banking Sector: Comprehensive Review of Advanced Learning Methods for Credit Risk Assessment. International Journal of Computing and Digital Systems, 14(1), 1-xx.
- Amarnadh, V., & Rao, M. N. (2025). A Consensus Blockchain-Based Credit Risk Evaluation and Credit Data Storage Using Novel Deep Learning Approach. Computational Economics, 1-34.
- Swetha, A., & Shailaja, K. (2019, December). An effective approach for security attacks based on machine learning algorithms. In International Conference on Advances in Computational Intelligence and Informatics(pp. 293-299). Singapore: Springer Singapore.
- Madhuri, N. S., Shailaja, K., Saha, D., Glory, K. B., & Sumithra, M. (2022). IOT integrated smart grid management system for effective energy management. Measurement: Sensors, 24, 100488.
- Shailaja, K., & Anuradha, B. (2017, October). Deep learning based adaptive linear collaborative discriminant regression classification for face recognition. In International Conference on Next Generation Computing Technologies(pp. 675-686). Singapore: Springer Singapore.
- Shailaja, K., & Anuradha, B. (2017). Improved face recognition using a modified PSO based self-weighted linear collaborative discriminant regression classification. Eng. Appl. Sci, 12, 7234-7241.
- Sekhar, P. R., & Sujatha, B. (2020, July). A literature review on feature selection using evolutionary algorithms. In 2020 7th International Conference on Smart Structures and Systems (ICSSS)(pp. 1-8). IEEE.
- Sekhar, P. R., & Goud, S. (2024). Collaborative Learning Techniques in Python Programming: A Case Study with CSE Students at Anurag University. Journal of Engineering Education Transformations, 38.
- Sekhar, P. R., & Sujatha, B. (2023). Feature extraction and independent subset generation using genetic algorithm for improved classification. J. Intell. Syst. Appl. Eng, 11, 503-512.
- Pesaramelli, R. S., & Sujatha, B. (2024, March). Principle correlated feature extraction using differential evolution for improved classification. In AIP Conference Proceedings(Vol. 2919, No. 1). AIP Publishing.
- Sharma, S., Vij, S., Praveen, R. V. S., Srinivasan, S., Yadav, D. K., & VS, R. K. (2024, October). Stress Prediction in Higher Education Students Using Psychometric Assessments and AOA-CNN-XGBoost Models. In 2024 4th International Conference on Sustainable Expert Systems (ICSES)(pp. 1631-1636). IEEE.
- Anuprathibha, T., Praveen, R. V. S., Sukumar, P., Suganthi, G., & Ravichandran, T. (2024, October). Enhancing Fake Review Detection: A Hierarchical Graph Attention Network Approach Using Text and Ratings. In 2024 Global Conference on Communications and Information Technologies (GCCIT)(pp. 1-5). IEEE.
- Shinkar, A. R., Joshi, D., Praveen, R. V. S., Rajesh, Y., & Singh, D. (2024, December). Intelligent solar energy harvesting and management in IoT nodes using deep self-organizing maps. In 2024 International Conference on Emerging Research in Computational Science (ICERCS)(pp. 1-6). IEEE.
- Praveen, R. V. S., Hemavathi, U., Sathya, R., Siddiq, A. A., Sanjay, M. G., & Gowdish, S. (2024, October). AI Powered Plant Identification and Plant Disease Classification System. In 2024 4th International Conference on Sustainable Expert Systems (ICSES)(pp. 1610-1616). IEEE.
- Dhivya, R., Sagili, S. R., Praveen, R. V. S., VamsiLala, P. N. V., Sangeetha, A., & Suchithra, B. (2024, December). Predictive Modelling of Osteoporosis using Machine Learning Algorithms. In 2024 4th International Conference on Ubiquitous Computing and Intelligent Information Systems (ICUIS)(pp. 997-1002). IEEE.
- Kemmannu, P. K., Praveen, R. V. S., Saravanan, B., Amshavalli, M., & Banupriya, V. (2024, December). Enhancing Sustainable Agriculture Through Smart Architecture: An Adaptive Neuro-Fuzzy Inference System with XGBoost Model. In 2024 International Conference on Sustainable Communication Networks and Application (ICSCNA)(pp. 724-730). IEEE.
- Praveen, R. V. S. (2024). Data Engineering for Modern Applications. Addition Publishing House.
- Sharma, T., Reddy, D. N., Kaur, C., Godla, S. R., Salini, R., Gopi, A., & Baker El-Ebiary, Y. A. (2024). Federated Convolutional Neural Networks for Predictive Analysis of Traumatic Brain Injury: Advancements in Decentralized Health Monitoring. International Journal of Advanced Computer Science & Applications, 15(4).
- JYOTHI, D., VIJAY, P. J., KUMAR, M. K., LAKSHMI, R. V., POPELO, O., MARHASOVA, V., … & KUMAR, D. V. (2025). DESIGN OF AN IMPROVED METHOD FOR INTRUSION DETECTION USING CNN, LSTM, AND BLOCK CHAIN. Journal of Theoretical and Applied Information Technology, 102(1).
- Saravanan, V., Sumalatha, A., Reddy, D. N., Ahamed, B. S., & Udayakumar, K. (2024, October). Exploring Decentralized Identity Verification Systems Using Blockchain Technology: Opportunities and Challenges. In 2024 5th IEEE Global Conference for Advancement in Technology (GCAT)(pp. 1-6). IEEE.
- GAVARRAJU, L. N. J., RAO, A. S., ANUSHA, R., REDDY, D. N., ANANTULA, J., & SURENDRA, D. (2024). INTEGRATING MULTIMODAL MEDICAL IMAGING DATA FOR ENHANCED BONE CANCER DETECTION: A DEEP LEARNING-BASED FEATURE FUSION APPROACH. Journal of Theoretical and Applied Information Technology, 102(18).
- Nimma, D., Rao, P. L., Ramesh, J. V. N., Dahan, F., Reddy, D. N., Selvakumar, V., … & Jangir, P. (2025). Reinforcement Learning-Based Integrated Risk Aware Dynamic Treatment Strategy for Consumer-Centric Next-Gen Healthcare. IEEE Transactions on Consumer Electronics.
- Arockiam, J. M., Panhalkar, A. R., Bhosale, R. S., Kavitha, S., Reddy, D. N., & Kodali, S. (2025). Leveraging Gradient based Optimization based Unequal Clustering Algorithm for Hotspot Problem in Wireless Sensor Networks. Indonesian Journal of Electrical Engineering and Informatics (IJEEI), 13(1), 156-168.
- Pathipati, H., Ramisetti, L. N. B., Reddy, D. N., Pesaru, S., Balakrishna, M., & Anitha, T. (2025). Optimizing Cancer Detection: Swarm Algorithms Combined with Deep Learning in Colon and Lung Cancer using Biomedical Images. Diyala Journal of Engineering Sciences, 91-102.
- REDDY, D. N., KADARU, B. B., SREENIVASULU, A., KANCHANA, R., JANGIR, P., & KUMAR, C. R. (2025). EFFICIENT OBJECT DETECTION IN AGRICULTURAL ENVIRONMENTS IMPLEMENTING COLOR FEATURES EXTREME LEARNING MACHINE. Journal of Theoretical and Applied Information Technology, 103(1).
- Padmaja, G., Pesaru, S., Reddy, D. N., Kumari, D. A., & Maram, S. P. (2025). Robust Vehicle Number Plate Text Recognition and Data Analysis Using Tesseract Ocr. In ITM Web of Conferences(Vol. 74, p. 01009). EDP Sciences.
- Reddy, K. V., Reddy, D. N., Balakrishna, M., Srividya, Y., & Pesaru, S. (2025). User Friendly and Efficient Mini Wallet for Sending Ethers. In ITM Web of Conferences(Vol. 74, p. 02008). EDP Sciences.