Skip to main content
Log in

An Efficient Android Malware Detection Using Adaptive Red Fox Optimization Based CNN

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Android smartphones are employed widely due to its flexible programming system with several user-oriented features in daily lives. With the substantial growth rate of smartphone technologies, cyber-attack against such devices has surged at an exponential rate. Majority of the smartphone users grant permission blindly to various arbitrary applications and hence it weakens the efficiency of the authorization mechanism. Numerous approaches were established in effective malware detection, but due to certain limitations like low identification rate, low malware detection rate as well as category detection, the results obtained are ineffective. Therefore, this paper proposes a convolutional neural network based adaptive red fox optimization (CNN-ARFO) approach to detect the malware applications as benign or malware. The proposed approach comprising of three different phases namely the pre-processing phase, feature extraction phase and the detection phase for the effective detection of android malware applications. In the pre-processing phase, the selected dataset utilizes Minmax technique to normalize the features. Then the malicious APK and the collected benign apps are investigated to identify and extract the essential features for the proper functioning of malware in the extraction phase. Finally, the android mobile applications are detected using CNN based ARFO approach. Then the results based on detecting the benign and malicious applications from the android mobiles are demonstrated by evaluating certain parameters like model accuracy rate, model loss rate, accuracy, precision, recall and f-measure. The resulting outcome revealed that the detection accuracy achieved by the proposed approach is 97.29%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Availability of Data and Material

Data sharing is not applicable to this article as no new data were created or analyzed in this study.

Code Availability

Not applicable.

References

  1. Syrris, V., & Geneiatakis, D. (2021). On machine learning effectiveness for malware detection in android OS using static analysis data. Journal of Information Security and Applications, 59, 102794.

    Article  Google Scholar 

  2. Cai, L., Li, Y., & Xiong, Z. (2021). JOWMDroid: Android malware detection based on feature weighting with joint optimization of weight-mapping and classifier parameters. Computers & Security, 100, 102086.

    Article  Google Scholar 

  3. Ren, Z., Haomin, Wu., Ning, Q., Hussain, I., & Chen, B. (2020). End-to-end malware detection for android IoT devices using deep learning. Ad Hoc Networks, 101, 102098.

    Article  Google Scholar 

  4. Bhatia, T., & Kaushal R. (2017). Malware detection in android based on dynamic analysis. In 2017 International conference on cyber security and protection of digital services (Cyber security) (pp. 1–6). IEEE.

  5. Zhou, Q., Feng, F., Shen, Z., Zhou, R., Hsieh, M.-Y., & Li, K.-C. (2019). A novel approach for mobile malware classification and detection in Android systems. Multimedia Tools and Applications, 78(3), 3529–3552.

    Article  Google Scholar 

  6. Alzaylaee, M. K., Yerima, S. Y., & Sezer, S. (2020). DL-Droid: Deep learning based android malware detection using real devices. Computers & Security, 89, 101663.

    Article  Google Scholar 

  7. Sundararaj, V. (2016). An efficient threshold prediction scheme for wavelet based ECG signal noise reduction using variable step size firefly algorithm. Intenational Journal of Intelligent Engineering and Systems, 9(3), 117–126.

    Article  Google Scholar 

  8. Sundararaj, V., Anoop, V., Dixit, P., Arjaria, A., Chourasia, U., Bhambri, P., Rejeesh, M. R., & Sundararaj, R. (2020). CCGPA-MPPT: Cauchy preferential crossover-based global pollination algorithm for MPPT in photovoltaic system. Progress in Photovoltaics Research and Applications, 28(11), 1128–1145.

    Article  Google Scholar 

  9. Vinu, S. (2019). Optimal task assignment in mobile cloud computing by queue based ant-bee algorithm. Wireless Personal Communications, 104(1), 173–197.

    Article  Google Scholar 

  10. Sundararaj, V., Muthukumar, S., & Kumar, R. S. (2018). An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks. Computers & Security, 77, 277–288.

    Article  Google Scholar 

  11. Rejeesh, M. R. (2019). Interest point based face recognition using adaptive neuro fuzzy inference system. Multimedia Tools and Applications, 78(16), 22691–22710.

    Article  Google Scholar 

  12. Kavitha, D., & Ravikumar, S. (2021). IOT and context-aware learning-based optimal neural network model for real-time health monitoring. Transactions on Emerging Telecommunications Technologies, 32(1), e4132.

    Article  Google Scholar 

  13. Hassan, B. A., & Rashid, T. A. (2020). Datasets on statistical analysis and performance evaluation of backtracking search optimisation algorithm compared with its counterpart algorithms. Data Brief, 28, 105046.

    Article  Google Scholar 

  14. Hassan, B. A. (2020). CSCF: A chaotic sine cosine firefly algorithm for practical application problems. Neural Computing and Applications, 33, 1–20.

    Google Scholar 

  15. Gowthul Alam, M. M., & Baulkani, S. (2017). Reformulated query-based document retrieval using optimised kernel fuzzy clustering algorithm. International Journal of Business Intelligence and Data Mining, 12(3), 299.

    Article  Google Scholar 

  16. Manikandan, N., Gobalakrishnan, N., & Pradeep, K. (2022). Bee optimization based random double adaptive whale optimization model for task scheduling in cloud computing environment. Computer Communications, 187, 35–44.

    Article  Google Scholar 

  17. Bayazit, E. C., Sahingoz, O. K., & Dogan, B. 2020. Malware detection in Android systems with traditional machine learning models: A survey. In 2020 International congress on human–computer interaction, optimization and robotic applications (HORA) (pp. 1–8). IEEE.

  18. Millar, S., McLaughlin, N., Martinez del Rincon, J., Miller, P., & Zhao, Z. (2020). DANdroid: A multi-view discriminative adversarial network for obfuscated Android malware detection. In Proceedings of the tenth ACM conference on data and application security and privacy (pp. 353–364).

  19. Jerbi, M., Dagdia, Z. C., Bechikh, S., & Said, L. B. (2020). On the use of artificial malicious patterns for android malware detection. Computers & Security, 92, 101743.

    Article  Google Scholar 

  20. Wu, Q., Li, M., Zhu, X., & Liu, B. (2020). Mviidroid: A multiple view information integration approach for android malware detection and family identification. IEEE Multimedia, 27(4), 48–57.

    Article  Google Scholar 

  21. Hussain, S.J., Ahmed, U., Liaquat, H., Mir, S., Jhanjhi, N. Z., & Humayun. M (2019). IMIAD: Intelligent malware identification for android platform. In 2019 International conference on computer and information sciences (ICCIS) (pp. 1–6). IEEE.

  22. Feng, P., Ma, J., Sun, C., Xinpeng, Xu., & Ma, Y. (2018). A novel dynamic android malware detection system with ensemble learning. IEEE Access, 6, 30996–31011.

    Article  Google Scholar 

  23. Xiao, X., Zhang, S., Mercaldo, F., Guangwu, Hu., & Sangaiah, A. K. (2019). Android malware detection based on system call sequences and LSTM. Multimedia Tools and Applications, 78(4), 3979–3999.

    Article  Google Scholar 

  24. Imtiaz, S. I., urRehman, S., Javed, A. R., Jalil, Z., Liu, X., & Alnumay, W. S. (2021). DeepAMD: Detection and identification of android malware using high-efficient deep artificial neural network. Future Generation computer systems, 115, 844–856.

    Article  Google Scholar 

  25. Mahindru, A., & Sangal, A. L. (2021). MLDroid—Framework for android malware detection using machine learning techniques. Neural Computing and Applications, 33(10), 5183–5240.

    Article  Google Scholar 

  26. Zhu, H., Li, Y., Li, R., Li, J., You, Z.-H., & Song, H. (2020). Sedmdroid: An enhanced stacking ensemble of deep learning framework for android malware detection. IEEE Transactions on Network Science and Engineering, 8, 984–994.

    Article  Google Scholar 

  27. Su, X., Shi, W., Xilong, Qu., Zheng, Y., & Liu, X. (2020). DroidDeep: Using deep belief network to characterize and detect Android malware. Soft Computing, 24, 1–14.

    Article  Google Scholar 

  28. Zhang, H., Luo, S., Zhang, Y., & Pan, L. (2019). An efficient android malware detection system based on method-level behavioral semantic analysis. IEEE Access, 7, 69246–69256.

    Article  Google Scholar 

  29. Wang, W., Zhao, M., & Wang, J. (2019). Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network. Journal of Ambient Intelligence and Humanized Computing, 10(8), 3035–3043.

    Article  Google Scholar 

  30. Karbab, E. B., Debbabi, M., Derhab, A., & Mouheb, D. (2017). Android malware detection using deep learning on API method sequences. arXiv:1712.08996.

  31. Alazab, M., Alazab, M., Shalaginov, A., Mesleh, A., & Awajan, A. (2020). Intelligent mobile malware detection using permission requests and API calls. Future Generation Computer Systems, 107, 509–521.

    Article  Google Scholar 

  32. Jiang, X., Mao, B., Guan, J., & Huang, X. (2020). Android malware detection using fine-grained features. Scientific Program, 2020, 1–13.

    Google Scholar 

  33. Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep learning. MIT Press.

    MATH  Google Scholar 

  34. Garg, M., & Dhiman, G. (2020). Deep convolution neural network approach for defect inspection of textured surfaces. Journal of the Institute of Electronics and Computer, 2(1), 28–38.

    Article  Google Scholar 

  35. Kumar, A., Gandhi, C. P., Zhou, Y., Kumar, R., & Xiang, J. (2020). Improved deep convolution neural network (CNN) for the identification of defects in the centrifugal pump using acoustic images. Applied Acoustics, 167, 107399.

    Article  Google Scholar 

  36. Połap, D., & Woźniak, M. (2021). Red fox optimization algorithm. Expert Systems with Applications, 166, 114107.

    Article  Google Scholar 

  37. Braik, M. S. (2021). Chameleon Swarm Algorithm: A bio-inspired optimizer for solving engineering design problems. Expert Systems with Applications, 174, 114685.

    Article  Google Scholar 

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Contributions

PCSM agreed on the content of the study. PCSM and SH collected all the data for analysis. PCSM agreed on the methodology. PCSM and SH completed the analysis based on agreed steps. Results and conclusions are discussed and written together. Both author read and approved the final manuscript.

Corresponding author

Correspondence to P. C. Senthil Mahesh.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Consent to Participate

Not applicable.

Consent for Publication

Not applicable.

Ethics Approval

Compliance with Ethical Standards.

Human and Animal Rights

This article does not contain any studies with human or animal subjects performed by any of the authors.

Informed Consent

For this type of study informed consent is not required.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mahesh, P.C.S., Hemalatha, S. An Efficient Android Malware Detection Using Adaptive Red Fox Optimization Based CNN. Wireless Pers Commun 126, 679–700 (2022). https://doi.org/10.1007/s11277-022-09765-0

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-09765-0

Keywords