Reference Hub3
Android Malware Detection Techniques in Traditional and Cloud Computing Platforms: A State-of-the-Art Survey

Android Malware Detection Techniques in Traditional and Cloud Computing Platforms: A State-of-the-Art Survey

Aayush Vishnoi, Preeti Mishra, Charu Negi, Sateesh Kumar Peddoju
Copyright: © 2021 |Volume: 11 |Issue: 4 |Pages: 23
ISSN: 2156-1834|EISSN: 2156-1826|EISBN13: 9781799862475|DOI: 10.4018/IJCAC.2021100107
Cite Article Cite Article

MLA

Vishnoi, Aayush, et al. "Android Malware Detection Techniques in Traditional and Cloud Computing Platforms: A State-of-the-Art Survey." IJCAC vol.11, no.4 2021: pp.113-135. http://doi.org/10.4018/IJCAC.2021100107

APA

Vishnoi, A., Mishra, P., Negi, C., & Peddoju, S. K. (2021). Android Malware Detection Techniques in Traditional and Cloud Computing Platforms: A State-of-the-Art Survey. International Journal of Cloud Applications and Computing (IJCAC), 11(4), 113-135. http://doi.org/10.4018/IJCAC.2021100107

Chicago

Vishnoi, Aayush, et al. "Android Malware Detection Techniques in Traditional and Cloud Computing Platforms: A State-of-the-Art Survey," International Journal of Cloud Applications and Computing (IJCAC) 11, no.4: 113-135. http://doi.org/10.4018/IJCAC.2021100107

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In the mobile world, Android is the most popular choice of manufacturers and users alike. Meanwhile, a number of malicious applications abbreviated as malapps or malware have increased explosively. Malware writers make use of existing apps to send malware to users' devices. To check presence of malware, the authors perform malware analysis of apps. In this paper, they provide a comprehensive review on state-of-the-art android malware detection approaches using traditional and cloud computing platforms. The paper also presents attack taxonomy to better understand security threat against Android. Furthermore, it describes various possible attacking features (static and dynamic) and their analysis mechanism. Various security tools have also been discussed. It presents two case studies: one for malware feature extraction and the other for demonstrating the use of machine learning for malware analysis in order to provide a practical insight of malware analysis. The results of malware analysis seem to be promising.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.