Leveraging Convolutional Neural Networks for Malware Detection: A Review of Techniques, Architectures, and Emerging Trends
DOI:
https://doi.org/10.53469/wjimt.2026.09(02).04Keywords:
Convolutional Neural Network, Android Malware, Cross-validation, PermissionsAbstract
With the modernization of the Internet and society, people often use some mobile phone applications to facilitate their lives. But since most of these apps require sensitive information from users, malware has been developed by malicious people to infect users' phones, especially on the Android platform. In order to detect whether a file after download is malware, this paper takes a static detection method. By decompiling and uncompressing the downloaded APK file, extracting the software rights from it, converting the rights into feature graphs, and putting them in a neural network to test. After four fold cross-testing, the average accuracy on the validation set was 88.205 percent. The group that trained the network with the highest accuracy of its data sets was then selected as the training set for the final network, and then tested on a test set, which showed that this method worked better than traditional machine learning methods.
References
Jingping Li. A method for Android malware detection based on privilege [J]. Journal of Northwest University for Nationalities (Natural Science Edition), 2017, 38 (02): 9-13.
Xiaochun Hu, Chengyu Zhu, Yan Chen. Study and analysis of deep convolutional Divine network model [J]. Information Technology and Informatization, 2021 (4): 107-110.
Jie Liang, Jiahao Chen, Xueqin Zhang, Yue Zhou, Jiajun Lin. Anomaly detection based on unique thermal coding and convolutional Divine network [J]. Proceedings of Tsinghua University (Natural Sciences Edition), 2019, 59 (07): 523-529.
YishengFu, Tianliang Lu, Zeliang Ma. One-Hot based CNN malicious code detection technology [J]. Computer Applications and Software, 2020, 37 (01): 304-308,333.
Yuwei Zhang, Yingchun Huang. Research on Malware Classification and Identification Based on Machine Learning [J]. Science and Technology Information, 2018,16 (30): 9-11.
Xuetao Zhang, Meng Sun, Jinshuang Wang. A fast multi-granularity detection approach for Android malicious code based on operation code [J]. Journal of network and information security, 2019, 5 (06): 85-94.
YueTeng, Tianbao Wang. Research on Android Malware Detection Model [J]. Science and Technology, 2017 (02): 51, 61.