Machine Learning-Based Malicious App Detection of Android

Authors

  • Mohammed Taha Mahmood, Syed khaja Irfan Uddin, Ahmed Abdul Samad, Mohammed Rahmat Ali

DOI:

https://doi.org/10.17762/msea.v72i1.2357

Abstract

Recent years have seen a continuous increase mostly in utilization of high- tech smart telephones, together with the growth of Program programming service users. A few attendees began creating vengeful Mobile apps as a tool to steal sensitive facts but instead knowledge as forgery as well as deception of moveable banks and varied bags due to their growth among Google operating system patients. There is good amount many evil programmes and tools that may be found, as well as malicious behavior. However, a realistically effective more spiteful signer mechanism is anticipated to cope to address new sophisticated evil apps created by intruders or engineers. These article uses techniques corresponding sub device teaching to identify malicious Web apps. First, using a Virtual feature extraction, a sample of previous threat actors must be gathered. The main steps performed through this framework are sketched as follows Using various potential methods of assessing virus, a collection of characteristics is produced for each source format there in teaching or tested samples.

Downloads

Published

2023-01-12

How to Cite

Mohammed Taha Mahmood, Syed khaja Irfan Uddin, Ahmed Abdul Samad, Mohammed Rahmat Ali. (2023). Machine Learning-Based Malicious App Detection of Android. Mathematical Statistician and Engineering Applications, 72(1), 1367–1373. https://doi.org/10.17762/msea.v72i1.2357

Issue

Section

Articles