Table 2 A comparison of related work based on dynamic analysis techniques.

From: Efficient feature ranked hybrid framework for android Iot malware detection

Ref.

Feature

Accuracy

ML techniques

Contribution

Recommendations

48

Memory, API calls, network, battery, logcat, and process features totaling 141 dynamic characteristics

98.4%

Decision Tree, Random Forest

Dynamic features are analyzed before and after rebooting the emulator, with entropy values calculated to track behavioral changes across 12 malware categories and 147 families, Using the CCCS-CIC-AndMal2020 dataset, the authors dynamically analyzed a large set of malware and benign samples to ensure robust classification and characterization.

The paper suggests extending the dynamic analysis to real devices, as some malware samples detect and avoid emulation environments, reducing the effective sample size, incorporating more feature types, particularly those that may bypass or obscure emulation detection, could enhance the detection model’s accuracy and reliability​

32

Network traffic data

99.73%

Random Forest (RF), Support Vector Machine (SVM), Decision Tree (DT), and Convolutional Neural Network (CNN)

Development of a BIR-CNN (Batch-normalized Inception-Residual CNN) model to classify Android malware, integrating inception-residual network modules with batch normalization to enhance learning and avoid overfitting, proposal of a 347-dimensional network traffic feature extraction method, improving feature comprehensiveness and model accuracy

Extend the BIR-CNN model for emerging Android software classification, identifying both benign and malicious applications, as well as categorizing new malware families, explore new datasets with diverse static and dynamic features for broader validation, enhancing the model’s generalizability across various network traffic profiles​

33

Permissions, API calls, intents

93.7%

SVM

the development of Sec-SVM, a secure-learning algorithm that enhances resilience against evasion attacks.

Applying secure-learning paradigms to other security tasks and continuing research on adversary-aware machine learning techniques, extending the secure-learning approach to other malware detection tasks and integrating dynamic analysis

34

Permissions and API calls

98.8%

SVM, MLP

The paper presents MLDroid, a web-based Android malware detection framework that effectively uses permissions and API calls to distinguish between benign and malicious apps.

exploring additional machine learning models and feature selection methods to further enhance malware detection capabilities, the application of MLDroid in real-world scenarios for detecting both known and unknown malware families efficiently.

35

Opcode, API features, and permission

98%

DNN

Android malware detection framework that utilizes multiple static features and a multimodal deep learning approach to improve detection accuracy

Exploring integrating dynamic features with the existing static feature-based framework to enhance detection capabilities, using the proposed multimodal deep learning appro3ach as it effectively improves the accuracy of Android malware detection​

26

API calls, permissions, intents

93.4%

Deep ANN

The paper introduces DeepAMD, a novel approach for detecting and identifying Android malware, which outperforms existing methods by enhancing detection accuracy on both static and dynamic layers​

Developing an online service to allow users to check whether an application is benign or malicious before downloading it​, using DeepAMP for effective and accurate detection and identification of Android malware, as it shows superior performance compared to other existing techniques

19

Permissions

99.97%

MLP, KNN and Random forest

The research evaluates 49 malware families using extensive datasets and demonstrates the effectiveness of machine learning classifiers in mobile malware detection.

The authors suggest further exploration of dynamic analysis techniques and broader datasets to improve detection accuracy, integrating anomaly-based intrusion detection systems with machine learning classifiers for enhanced mobile malware detection capabilities.

45

Runtime network-behavioral

98.6–99.1%

CNN, LSTM

In this paper, a collaborative threat intelligence framework for IoT is suggested that integrates blockchain for the secure sharing of threat data among the devices and applies machine learning models (CNN/LSTM among others) to the shared behavioral data for detection improvement across many devices. It showcases the capability of the decentralized ledger technology along with the collective intelligence to increase the detection of malware/attacks in the IoT significantly over the single-device solutions.

Implementing the framework in actual heterogeneous IoT networks (not just the dataset) so that its scalability and robustness can be validated. They also suggest investigating privacy-preserving sharing mechanisms, advanced ML models for evolving threats, and lightweight deployment appropriate for IoT devices with limited power further.