Android malware detection using random forest algorithm

Authors

  • Samson Isaac Department of Computer Science, Kaduna State University, Kaduna Nigeria
  • Abdullahi Tanimu Department of Computer Science, Kaduna State University, Kaduna Nigeria
  • Mohammed Shamsuddeen Tukur Department of Computer Science, Kaduna State University, Kaduna Nigeria
  • Jacob Isaac Department of Agriculture, Kaduna State College of Education, Gidan Waya, Kaduna Nigeria
  • Amina Bala Ja'afaru Department of Computer Science, Kaduna State University, Kaduna Nigeria

Keywords:

Android, Random forest, Malware, Mobile device

Abstract

The proliferation of mobile devices and their dependence on the android OS has made them prime targets for cybercriminals, leading to an escalating threat of malware. This study addresses the growing need for effective malware detection methods by exploring the application of machine learning (ML) techniques to enhance the security of Android devices. Specifically, the research investigates the performance of various ML algorithms, with a focus on Random Forest, in detecting malware on the android platform. Through the comprehensive analysis and experimentation, the study demonstrate significant improvements in detection accuracy, achieving a near-perfect 0.99 across key performance metrics, including accuracy, recall, precision and F1-score. These results highlights the potential of ML to revolutionize Android OS malware detection, offering robust, real-time protection against evolving threats while minimizing the impact on device performance. The findings contribute valuable insights for cyber security practitioners, mobile app developers, and researchers, paving the way for more secure mobile environment and advanced malware detection systems.

Dimensions

[1] M. Odusami, O. Abayomi-Alli, S. Misra, O. Shobayo, R. Damasevicius & R. Maskeliunas, Android malware detection: a survey, in Applied Informatics, Communications in Computer and Information Science, Springer International Publishing, 2018. https://doi.org/10.1007/978-3-030-01535-0_19.

[2] A. B. Riad, ‘‘Plugin-based tool for teaching secure mobile application development’’, Information Systems Education Journal 19 (2022) 25. https://files.eric.ed.gov/fulltext/EJ1297704.pdf.

[3] E. J. AAlqahtani, R. Zagrouba & A. Almuhaideb, ‘‘A survey on android malware detection techniques using machine learning Algorithms’’, 6th International Conference on Software Defined Systems, (SDS), 2019, pp. 110-117. https://doi.org/10.1109/SDS.2019.8768729.

[4] W. T. Sung, ‘‘Smart garbage bin based on AIoT’’, Intelligent automation and soft computing 32 (2022) 1387. https://doi.org/10.32604/IASC.2022.022828.

[5] S. Modgil, ‘‘AI technologies and their impact on supply chain resilience during covid-19’’, International Journal of Physical Distribution and Logistics Management 52 (2022) 130. https://doi.org/10.1108/IJPDLM-12-2020-0434.

[6] F. Xu, ‘‘Android on PC: on the security of end-user android emulators’’, Proceedings of the ACM Conference on Computer and Communications Security, 2021, pp. 1566. https://doi.org/10.1145/3460120.3484774.

[7] F. A. Alaba, ‘‘Ransomware attacks on remote learning systems in 21st century: a survey’’, Biomedical Journal of Scientific & Technical Research 35 (2021) 27322. https://doi.org/10.26717/bjstr.2021.35.005649.

[8] S. Isaac, D. K. Ayodeji, Y. Luqman, S. M. Karma & J. Aminu, ‘‘Cyber security attack detection model using semi-supervised learning’’, FUDMA Journal of Sciences 8 (2024) 92.

[9] M. Humayun, ‘‘Internet of things and ransomware: evolution, mitigation and prevention’’, Egyptian Informatics Journal 22 (2021) 105. https://doi.org/10.1016/j.eij.2020.05.003.

[10] D. Su, ‘‘Detecting android locker-ransomware on chinese social networks’’, IEEE Access 7 (2019) 20381. https://doi.org/10.1109/ACCESS.2018.2888568.

[11] N. Saleem, ‘‘Enhancing security of android operating system based phones using quantum key distribution’’, EAI Endorsed Transactions on Scalable Information Systems 7 (2020) 28. https://doi.org/10.4108/eai.13-7-2018.165281.

[12] J. Rathod & D. Bhatti, Minimization of attributes for the detection of vulnerabilities in android applications, New Frontiers in Communication and Intelligent Systems, SCRS, India, 2022, pp. 475-487. https://doi.org/10.52458/978-81-95502-00-4-49.

[13] X. Zhan, ‘‘ATVHunter: reliable version detection of third-party libraries for vulnerability identification in android applications’’, 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE), Madrid, ES, 2021, pp. 1695-1707. https://doi.org/10.1109/ICSE43902.2021.00150.

[14] A. Stroumpoulis & E. Kopanaki, ‘‘Theoretical perspectives on sustainable supply chain management and digital transformation: a literature review and a conceptual framework’’, Sustainability (Switzerland) 14 (2022) 8. https://doi.org/10.3390/su14084862.

[15] M. Kehayov, L. Holder & V. Koch, ‘‘Application of artificial intelligence technology in the manufacturing process and purchasing and supply management’’, Procedia Computer Science 200 (2019) 1209. https://doi.org/10.1016/j.procs.2022.01.321.

[16] M. Regona, ‘‘Opportunities and adoption challenges of AI in the construction industry: a PRISMA review’’, Journal of Open Innovation: Technology, Market, and Complexity 8 (2022) 45. https://doi.org/10.3390/joitmc8010045.

[17] A. Ghosh, D. J. Edwards & M. R. Hosseini, ‘‘Patterns and trends in internet of things (IoT) research: future applications in the construction industry’’, Engineering, Construction and Architectural Management 28 (2021) 457. https://doi.org/10.1108/ECAM-04-2020-0271.

[18] N. M. Kumar, ‘‘Distributed energy resources and the application of an IoT, and blockchain in smart grids’’, Energies 13 (2020) 21. https://doi.org/10.3390/en13215739.

[19] S. Isaac, T. Abdullahi, M. S. Tukur, J. Isaac & A. B. Ja’afaru, ‘‘Social media fake news detection model using support vector machine’’, BIMA Journal of Science and Technology 9 (2025) 40. https://doi.org/10.56892/bima.v9i1A.12335.

[20] M. Tavana, ‘‘A review of digital transformation on supply chain process management using text mining’’, Processes 10 (2022) 842. https://doi.org/10.3390/pr10050842.

[21] H. H. R. Manzil & S. Manohar Naik, ‘‘Android malware category detection using a novel feature vector-based machine learning model’’, Cybersecurity 6 (2023) 6. https://doi.org/10.1186/s42400-023-00139-.

[22] E. Odat & Q. M. Yaseen, ‘‘A novel machine learning approach for android malware detection based on the co-existence of features’’, IEEE Access 11 (2023) 15471. https://doi.org/10.1109/ACCESS.2023.3244656.

Published

2025-05-03

How to Cite

Android malware detection using random forest algorithm. (2025). Proceedings of the Nigerian Society of Physical Sciences, 2(1), 178. https://doi.org/10.61298/pnspsc.2025.2.178

How to Cite

Android malware detection using random forest algorithm. (2025). Proceedings of the Nigerian Society of Physical Sciences, 2(1), 178. https://doi.org/10.61298/pnspsc.2025.2.178