An Effective Temporal Convolutional Networks-Based Method for Detecting Android Malware Using Dynamic Extracted Features

Article


Joomye, A., Ling, M. H., Jasser, M. B., Ramly, A. and Yau, K-L. A. 2025. An Effective Temporal Convolutional Networks-Based Method for Detecting Android Malware Using Dynamic Extracted Features. IEEE Access. 13, pp. 49891-49904. https://doi.org/10.1109/ACCESS.2025.3552070
AuthorsJoomye, A., Ling, M. H., Jasser, M. B., Ramly, A. and Yau, K-L. A.
Abstract

With an increase in the number and complexity of malware, traditional malware detection methods such as heuristic-based and signature-based ones have become less adequate, leaving user applications vulnerable. Therefore, it is necessary to continue proposing and investigating new methods for Android malware detection, including machine learning (ML) and deep learning (DL) based ones. A very highly effective DL model named temporal convolutional network (TCN) which makes use of causal convolution and dilation for sequential data processing, was yet to be implemented with various dynamically extracted features from Android malware applications. In several applications, TCN has proven to be more effective with sequential data, faster due to parallelism and less computationally exhaustive. This paper proposes a new and improved method using TCN for Android malware detection with dynamically extracted feature types including system calls, binder calls and composite behaviours. The proposed method achieves high effectiveness for dynamic Android malware detection with a validation F1-Score of 99.59% and has also shown higher effectiveness than other papers using the same (CICMalDroid 2020) dataset for dynamic Android malware detection.

JournalIEEE Access
Journal citation13, pp. 49891-49904
ISSN2169-3536
Year2025
PublisherIEEE
Publisher's version
License
File Access Level
Anyone
Digital Object Identifier (DOI)https://doi.org/10.1109/ACCESS.2025.3552070
Publication dates
Online17 Mar 2025
Publication process dates
Deposited30 May 2025
Copyright holder© 2025 The Authors
Permalink -

https://repository.uel.ac.uk/item/8z9v8

  • 6
    total views
  • 1
    total downloads
  • 6
    views this month
  • 1
    downloads this month

Export as

Related outputs

Enhancing Phishing Universal Resource Locator Detection Systems Using Hybrid Machine Learning Classifiers and Data Balancing Techniques
Ibrahim, M., Hadi, B. M., Jasser, M. B., Ajibade, S-S. M., Ramly, A., Yong, Y. L. and Issa, B. 2024. Enhancing Phishing Universal Resource Locator Detection Systems Using Hybrid Machine Learning Classifiers and Data Balancing Techniques. 2024 IEEE 12th Conference on Systems, Process & Control (ICSPC). IEEE. https://doi.org/10.1109/ICSPC63060.2024.10862013
Artificial Intelligence Models in Power Generation for Energy Consumption Prediction
Tan, L. Y., Kwan, C. S. C., Ajibade, S-S. M. and Ramly, A. 2024. Artificial Intelligence Models in Power Generation for Energy Consumption Prediction. 2024 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC). IEEE. https://doi.org/10.1109/ETNCC63262.2024.10767519
Leveraging Artificial Intelligence to Secure Wireless Network: Exploring Threats, Existing Approaches, and Proposed Mitigation Strategies
Xin, A. L. N., Ramly, A., Behjati, M. and Sharif, S. 2024. Leveraging Artificial Intelligence to Secure Wireless Network: Exploring Threats, Existing Approaches, and Proposed Mitigation Strategies. 2024 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies. IEEE. https://doi.org/10.1109/3ict64318.2024.10824350
Enhancing Security: Evaluating RFID Card Access Control Systems using SHA-256
Yang, Y. Z., Ramly, A. and Sharif, S. 2024. Enhancing Security: Evaluating RFID Card Access Control Systems using SHA-256. 2024 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies. IEEE. https://doi.org/10.1109/3ict64318.2024.10824356