| Literature DB >> 33583978 |
Sharfah Ratibah Tuan Mat1, Mohd Faizal Ab Razak1, Mohd Nizam Mohmad Kahar1, Juliza Mohamad Arif1, Salwana Mohamad1, Ahmad Firdaus1.
Abstract
Malware is a blanket term for Trojan, viruses, spyware, worms, and other files that are purposely created to harm computers, mobile devices, or computer networks. Malware commonly steals, encrypts, damages, and causes a mess in these devices. The growth of malware attacks has a consequence on the growth and attractiveness of mobile features in mobile devices. Most malware research aims to probe the different methods of preventing, analysing, and detecting malware attacks. This paper aims to demonstrate an exhaustive knowledge map of the Android malware by collecting a ten (10) year dataset from the Web of Science database. A bibliometric analysis was employed for analysing articles published between 2010 and 2019. Using the keyword "malware", 5622 articles were retrieved. After scrutinising with the keywords of "Android malware", 1278 articles were then collected. This study provides an overview of the articles, productivity, research area, the Web of Science categories, authors, high-cited articles, institutions, and impact journals examining malware. Research activities are continued by placing terms in the classification of malware detection systems that outline important areas in malware research. From the analysis, it can be concluded that the highest number of publications focusing on malware studies came from the continent of Asia. Additionally, this study discusses the challenges of malware studies in the recent research studies as well as the future direction. © Akadémiai Kiadó, Budapest, Hungary 2021.Entities:
Keywords: Android malware; Bibliometric; Intrusion detection system; Web of science
Year: 2021 PMID: 33583978 PMCID: PMC7871169 DOI: 10.1007/s11192-020-03834-6
Source DB: PubMed Journal: Scientometrics ISSN: 0138-9130 Impact factor: 3.238
Publication of 7 continents
| Continent | Publication % |
|---|---|
| Asia | 40.5 |
| Europe | 26.5 |
| North America | 20.3 |
| Middle East | 8.7 |
| Australia | 2.3 |
| South America | 1.0 |
| Africa | 0.7 |
The list of studies of bibliometric methods
| References | Fields | Year |
|---|---|---|
| Prashar and Sunder ( | Sustainability development | 2020 |
| Shukla et al. ( | Medical Informatics | 2020 |
| Galetsi and Katsaliaki ( | Information Science | 2019 |
| Baker et al. ( | Financial economics | 2019 |
| Lu et al. ( | Public health | 2019 |
| Ahmad et al. ( | Dental traumatology | 2019 |
| Raparelli and Bajocco ( | Vehicle agricultural | 2019 |
| Firdaus et al. ( | Blockchain | 2019 |
| Razak et al. ( | Malware | 2016 |
| This study | Android malware | 2020 |
Fig. 1Methodology of data collection
Publication based on the year
| Year | 2010 | 2011 | 2012 | 2013 | 2014 | 2015 | 2016 | 2017 | 2018 | 2019 |
|---|---|---|---|---|---|---|---|---|---|---|
| No. of Publication | 1 | 6 | 26 | 60 | 119 | 198 | 241 | 254 | 236 | 137 |
| Publication % | 0.1 | 0.5 | 2.0 | 4.7 | 9.3 | 15.5 | 18.8 | 19.9 | 18.5 | 10.7 |
Fig. 2Numbers of publication type based on years
Productivity based on continents
| Continent/country | Number of articles | % of articles |
|---|---|---|
| South America | 17 | 1.0 |
| Argentina | 1 | 0.1 |
| Brazil | 5 | 0.3 |
| Chile | 2 | 0.1 |
| Colombia | 8 | 0.6 |
| Ecuador | 1 | 0.1 |
| North America | 330 | 20.3 |
| Canada | 48 | 2.9 |
| Mexico | 7 | 0.4 |
| Nicaragua | 4 | 0.2 |
| Russia | 6 | 0.4 |
| United States | 272 | 16.7 |
| Asia | 659 | 40.5 |
| Bangladesh | 5 | 0.3 |
| China | 328 | 20.1 |
| India | 110 | 6.8 |
| Indonesia | 4 | 0.2 |
| Japan | 15 | 0.9 |
| Malaysia | 42 | 2.6 |
| Alestine | 2 | 0.1 |
| Singapore | 33 | 2.0 |
| South Korea | 73 | 4.5 |
| Sri Lanka | 1 | 0.1 |
| Taiwan | 33 | 2.0 |
| Thailand | 3 | 0.2 |
| Vietnam | 10 | 0.6 |
| Europe | 431 | 26.5 |
| Austria | 13 | 0.8 |
| Belgium | 3 | 0.2 |
| Croatia | 2 | 0.1 |
| Cyprus | 3 | 0.2 |
| Czech Republic | 5 | 0.3 |
| Denmark | 7 | 0.4 |
| England | 60 | 3.7 |
| Finland | 10 | 0.6 |
| France | 36 | 2.2 |
| Germany | 44 | 2.7 |
| Greece | 14 | 0.9 |
| Iceland | 1 | 0.1 |
| Italy | 98 | 6.0 |
| Luxembourg | 20 | 1.2 |
| Malta | 1 | 0.1 |
| Myanmar | 1 | 0.1 |
| Netherlands | 5 | 0.3 |
| North Ireland | 13 | 0.8 |
| Norway | 2 | 0.1 |
| Poland | 2 | 0.1 |
| Portugal | 6 | 0.4 |
| Romania | 6 | 0.4 |
| Scotland | 8 | 0.5 |
| Slovakia | 2 | 0.1 |
| Spain | 46 | 2.8 |
| Sweden | 9 | 0.6 |
| Switzerland | 11 | 0.7 |
| Ukraine | 1 | 0.1 |
| Wales | 2 | 0.1 |
| Australia | 37 | 2.3 |
| Australia | 35 | 2.1 |
| New Zealand | 2 | 0.1 |
| Middle East | 142 | 8.7 |
| Algeria | 2 | 0.1 |
| Egypt | 3 | 0.2 |
| Iran | 17 | 1.0 |
| Israel | 7 | 0.4 |
| Jordan | 4 | 0.2 |
| Lebanon | 4 | 0.2 |
| Morocco | 2 | 0.1 |
| Oman | 1 | 0.1 |
| Pakistan | 29 | 1.8 |
| Qatar | 5 | 0.3 |
| Saudi Arabia | 24 | 1.5 |
| Turkey | 38 | 2.3 |
| U Arab Emirates | 6 | 0.4 |
| Africa | 12 | 0.7 |
| Namibia | 1 | 0.1 |
| Nigeria | 3 | 0.2 |
| South Africa | 7 | 0.4 |
| Tunisia | 1 | 0.1 |
Productivity of continent based on year
| Continent/country | Year | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|
| 2010 | 2011 | 2012 | 2013 | 2014 | 2015 | 2016 | 2017 | 2018 | 2019 | |
| South America | 0 | 0 | 0 | 0 | 1 | 5 | 5 | 0 | 3 | 4 |
| Argentina | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 |
| Brazil | 0 | 0 | 0 | 0 | 0 | 2 | 1 | 0 | 2 | 0 |
| Chile | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 0 | 0 | 0 |
| Colombia | 0 | 0 | 0 | 0 | 1 | 2 | 3 | 0 | 1 | 2 |
| Ecuador | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 |
| North America | 0 | 1 | 9 | 21 | 33 | 54 | 71 | 64 | 62 | 15 |
| Canada | 0 | 0 | 2 | 0 | 5 | 11 | 7 | 7 | 11 | 5 |
| Mexico | 0 | 0 | 0 | 0 | 0 | 0 | 5 | 1 | 1 | 0 |
| Nicaragua | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 2 | 1 | 0 |
| Russia | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 4 | 1 | 0 |
| United States | 0 | 1 | 6 | 21 | 28 | 43 | 58 | 50 | 48 | 10 |
| Asia | 0 | 1 | 8 | 19 | 62 | 97 | 120 | 131 | 139 | 82 |
| Bangladesh | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 1 | 2 | 0 |
| China | 0 | 1 | 5 | 7 | 25 | 44 | 59 | 69 | 75 | 43 |
| India | 0 | 0 | 0 | 1 | 12 | 18 | 15 | 25 | 25 | 14 |
| Indonesia | 0 | 0 | 0 | 0 | 0 | 2 | 1 | 0 | 1 | 0 |
| Japan | 0 | 0 | 0 | 1 | 1 | 1 | 3 | 4 | 3 | 2 |
| Malaysia | 0 | 0 | 0 | 3 | 4 | 4 | 6 | 10 | 12 | 3 |
| Palestine | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 1 |
| Singapore | 0 | 0 | 0 | 0 | 1 | 5 | 10 | 7 | 6 | 4 |
| South Korea | 0 | 0 | 0 | 5 | 14 | 14 | 13 | 6 | 11 | 10 |
| Sri Lanka | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 |
| Taiwan | 0 | 0 | 2 | 1 | 5 | 7 | 10 | 4 | 2 | 2 |
| Thailand | 0 | 0 | 1 | 0 | 0 | 0 | 2 | 0 | 0 | 0 |
| Vietnam | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 5 | 2 | 3 |
| Europe | 0 | 5 | 10 | 21 | 34 | 63 | 89 | 91 | 77 | 41 |
| Austria | 0 | 0 | 1 | 3 | 2 | 1 | 2 | 1 | 1 | 2 |
| Belgium | 0 | 0 | 0 | 0 | 1 | 1 | 1 | 0 | 0 | 0 |
| Croatia | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 0 | 0 | 0 |
| Cyprus | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 2 | 0 |
| Czech Republic | 0 | 0 | 0 | 0 | 0 | 2 | 1 | 0 | 0 | 2 |
| Denmark | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 1 | 4 | 0 |
| England | 0 | 0 | 1 | 1 | 4 | 6 | 10 | 16 | 15 | 7 |
| Finland | 0 | 0 | 1 | 0 | 2 | 1 | 2 | 4 | 0 | 0 |
| France | 0 | 0 | 2 | 2 | 5 | 6 | 4 | 8 | 8 | 1 |
| Germany | 0 | 2 | 3 | 4 | 3 | 12 | 8 | 6 | 4 | 2 |
| Greece | 0 | 1 | 0 | 0 | 2 | 6 | 1 | 1 | 3 | 0 |
| Iceland | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 |
| Italy | 0 | 1 | 0 | 3 | 7 | 10 | 30 | 19 | 19 | 9 |
| Luxembourg | 0 | 0 | 1 | 0 | 2 | 3 | 5 | 7 | 0 | 2 |
| Malta | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 |
| Myanmar | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 |
| Netherlands | 0 | 0 | 0 | 1 | 0 | 0 | 1 | 2 | 1 | 0 |
| North Ireland | 0 | 0 | 0 | 1 | 2 | 2 | 2 | 2 | 1 | 3 |
| Norway | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 1 |
| Poland | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 0 | 0 |
| Portugal | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 3 | 1 | 1 |
| Romania | 0 | 0 | 0 | 0 | 0 | 3 | 0 | 2 | 1 | 0 |
| Scotland | 0 | 0 | 0 | 1 | 0 | 1 | 5 | 1 | 0 | 0 |
| Slovakia | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 0 |
| Spain | 0 | 0 | 1 | 4 | 2 | 5 | 4 | 10 | 12 | 8 |
| Sweden | 0 | 0 | 0 | 1 | 0 | 0 | 2 | 4 | 2 | 0 |
| Switzerland | 0 | 1 | 0 | 0 | 0 | 1 | 5 | 0 | 1 | 3 |
| Ukraine | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 |
| Wales | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 0 |
| Australia | 0 | 0 | 0 | 2 | 2 | 5 | 8 | 2 | 8 | 10 |
| Australia | 0 | 0 | 0 | 2 | 2 | 4 | 8 | 2 | 7 | 10 |
| New Zealand | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 1 | 0 |
| Middle East | 1 | 0 | 1 | 3 | 7 | 13 | 26 | 27 | 36 | 28 |
| Algeria | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 |
| Egypt | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 2 | 0 |
| Iran | 0 | 0 | 0 | 1 | 1 | 1 | 2 | 7 | 3 | 2 |
| Israel | 1 | 0 | 1 | 1 | 2 | 1 | 1 | 0 | 0 | 0 |
| Jordan | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 0 | 2 |
| Lebanon | 0 | 0 | 0 | 1 | 1 | 0 | 1 | 0 | 1 | 0 |
| Morocco | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 |
| Oman | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 |
| Pakistan | 0 | 0 | 0 | 0 | 0 | 2 | 7 | 2 | 11 | 7 |
| Qatar | 0 | 0 | 0 | 0 | 0 | 0 | 2 | 2 | 0 | 1 |
| Saudi Arabia | 0 | 0 | 0 | 0 | 2 | 1 | 3 | 6 | 4 | 8 |
| Turkey | 0 | 0 | 0 | 0 | 1 | 4 | 6 | 8 | 12 | 7 |
| U Arab Emirates | 0 | 0 | 0 | 0 | 0 | 2 | 1 | 1 | 1 | 1 |
| Africa | 0 | 0 | 2 | 0 | 2 | 3 | 0 | 1 | 1 | 3 |
| Namibia | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 |
| Nigeria | 0 | 0 | 0 | 0 | 1 | 1 | 0 | 0 | 0 | 1 |
| South Africa | 0 | 0 | 2 | 0 | 1 | 2 | 0 | 0 | 1 | 1 |
| Tunisia | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 |
Research area of studies
| Research areas | Publications | Publication % |
|---|---|---|
| Computer Science | 1100 | 86.1 |
| Engineering | 486 | 38.0 |
| Telecommunications | 321 | 25.0 |
| Science Technology Other Topics | 28 | 2.2 |
| Automation Control Systems | 28 | 2.2 |
| Robotics | 14 | 1.2 |
| Mathematics | 10 | 0.8 |
| Physics | 10 | 0.8 |
| Materials Science | 7 | 0.6 |
| Information Science Library Science | 5 | 0.4 |
| Operations Research Management Science | 5 | 0.4 |
| Chemistry | 4 | 0.3 |
| Education Educational Research | 3 | 0.2 |
| Instruments Instrumentation | 3 | 0.2 |
| Acoustics | 2 | 0.2 |
| Energy Fuels | 2 | 0.2 |
| Mechanics | 2 | 0.2 |
| Optics | 2 | 0.2 |
| Business Economics | 2 | 0.2 |
| Fisheries | 1 | 0.1 |
| Health Care Sciences Services | 1 | 0.1 |
| Imaging Science Photographic Technology | 1 | 0.1 |
| Legal Medicine | 1 | 0.1 |
| Mathematical Computational Biology | 1 | 0.1 |
| Medical Informatics | 1 | 0.1 |
| Psychology | 1 | 0.1 |
| Social Sciences Other Topics | 1 | 0.1 |
Web of Science categories
| WoS category | Publication | % Publication |
|---|---|---|
| Computer Science Theory Methods | 554 | 43.4 |
| Computer Science Information Systems | 499 | 39.0 |
| Engineering Electrical Electronic | 465 | 36.4 |
| Telecommunications | 319 | 25.0 |
| Computer Science Software Engineering | 211 | 16.5 |
| Computer Science Artificial Intelligence | 162 | 12.7 |
| Computer Science Hardware Architecture | 108 | 8.5 |
| Computer Science Interdisciplinary Applications | 102 | 8.0 |
| Automation Control Systems | 28 | 2.1 |
| Multidisciplinary Sciences | 19 | 1.5 |
| Engineering Multidisciplinary | 18 | 1.4 |
| Robotics | 14 | 1.1 |
| Computer Science Cybernetics | 9 | 0.7 |
| Mathematics Applied | 9 | 0.7 |
| Physics Applied | 8 | 0.6 |
| Materials Science Multidisciplinary | 7 | 0.6 |
| Logic | 6 | 0.5 |
| Information Science Library Science | 5 | 0.4 |
| Operations Research Management Science | 5 | 0.4 |
| Engineering Mechanical | 4 | 0.3 |
| Mathematics | 4 | 0.3 |
| Chemistry Multidisciplinary | 3 | 0.2 |
| Instruments Instrumentation | 3 | 0.2 |
| Acoustics | 2 | 0.2 |
| Education Educational Research | 2 | 0.2 |
| Education Scientific Disciplines | 2 | 0.2 |
| Energy Fuels | 2 | 0.2 |
| Engineering Industrial | 2 | 0.2 |
| Green Sustainable Science Technology | 2 | 0.2 |
| Mathematics Interdisciplinary Applications | 2 | 0.2 |
| Mechanics | 2 | 0.2 |
| Optics | 2 | 0.2 |
| Business | 1 | 0.1 |
| Chemistry Analytical | 1 | 0.1 |
| Engineering Aerospace | 1 | 0.1 |
| Ergonomics | 1 | 0.1 |
| Fisheries | 1 | 0.1 |
| Health Care Sciences Services | 1 | 0.1 |
| Imaging Science Photographic Technology | 1 | 0.1 |
| Mathematical Computational Biology | 1 | 0.1 |
| Medical Informatics | 1 | 0.1 |
| Medicine Legal | 1 | 0.1 |
| Nanoscience Nanotechnology | 1 | 0.1 |
| Physics Fluids Plasmas | 1 | 0.1 |
| Physics Mathematical | 1 | 0.1 |
| Physics Multidisciplinary | 1 | 0.1 |
| Psychology Experimental | 1 | 0.1 |
| Psychology Multidisciplinary | 1 | 0.1 |
| Social Sciences Interdisciplinary | 1 | 0.1 |
Authors
| Authors | Publication | % Publications | Institution | Country |
|---|---|---|---|---|
| Francesco Mercaldo | 33 | 2.5 | University of Sannio | Italy |
| Fabio Martinelli | 20 | 1.6 | University of Sannio | Italy |
| Mauro Conti | 19 | 1.5 | Uni of Padua | Italy |
| Carraro Aoron Visaggio | 18 | 1.4 | University of Sannio | Italy |
| Jacques Klein | 17 | 1.4 | Univ Luxembourg | Luxembourg |
| Yang Liu | 16 | 1.3 | Xidian Univ | China |
| Nor Badrul Anuar | 15 | 1.2 | Univ of Malaya | Malaysia |
| Li Li | 15 | 1.2 | Monash Uni | Australia |
| Tegawende F Bissyande | 14 | 1.1 | Univ Luxembourg | Luxembourg |
| Zhenxiang Chen | 13 | 1.0 | Univ of Jinan | China |
| Vijay Laxmi | 13 | 1.0 | Malaviya Natl Inst Technol | India |
| Wei Wang | 13 | 1.0 | Univ of Beijing | China |
| Manoj Singh Gaur | 12 | 0.9 | Malaviya Natl Inst Technol | India |
| Le Traon Yves | 12 | 0.9 | Univ Luxembourg | Luxembourg |
| Li Qi | 12 | 0.9 | Uni Beijing | China |
| Vittoria Nardone | 11 | 0.9 | University of Sannio | Italy |
| Sakir Sezer | 11 | 0.9 | University Belfast | Ireland |
| Vinod P | 11 | 0.9 | Uni of Padua | Italy |
| ShanshanWang | 10 | 0.8 | Univ of Jinan | China |
| QibenYan | 10 | 0.8 | Univ of Nebraska-Lincoln | United States |
| Suleiman Y. Yerima | 10 | 0.8 | University Belfast | Ireland |
Highly cited articles
| References | Number of Citation | Journal | Year | Research Area |
|---|---|---|---|---|
| Zhou and Jiang ( | 655 | 2012 IEEE Symposium on Security and Privacy (SP) | 2012 | Computer Science |
| Arzt et al. ( | 385 | ACM SIGPLAN Notices | 2014 | Computer Science |
| Asaf Shabtai et al. ( | 281 | Journal of Intelligent Information Systems | 2012 | Computer Science |
| Wu et al. ( | 192 | Proceedings of the 2012 Seventh Asia Joint Conference on Information Security (ASIAJCIS 2012) | 2012 | Computer Science |
| Aafer et al. ( | 187 | Security and Privacy in Communication Networks, SECURECOMM 2013 | 2013 | Computer Science |
| Davi et al. ( | 132 | Information Security | 2011 | Computer Science |
| Zhang et al. ( | 117 | Ccs'14: Proceedings of the 21st ACM Conference on Computer and Communications Security | 2014 | Computer Science |
| Faruki et al. ( | 111 | IEEE Communications Surveys and Tutorials | 2015 | Computer Science |
| Gorla et al. ( | 102 | 36th International Conference on Software Engineering (ICSE 2014) | 2014 | Computer Science |
| Feng et al. ( | 97 | 22nd ACM SIGSOFT International Symposium on The Foundations of Software Engineering (FSE 2014) | 2014 | Computer Science |
| Wei et al. ( | 96 | CCS'14: Proceedings of the 21st ACM Conference on Computer and Communications Security | 2014 | Computer Science |
| Peiravian and Zhu ( | 91 | 2013 IEEE 25th International Conference on Tools with Artificial Intelligence (ICTAI) | 2013 | Computer Science |
| Wang et al. ( | 82 | IEEE Transactions on Information Forensics and Security | 2014 | Computer Science |
| Suarez-Tangil et al. ( | 81 | Expert Systems with Applications | 2014 | Computer Science |
| Yerima et al. ( | 81 | 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA) | 2013 | Computer Science |
| Sanz et al. ( | 80 | International Joint Conference CISIS'12—ICEUTE'12—SOCO'12 Special Sessions | 2013 | Computer Science |
| Shabtai et al. ( | 70 | Computers & Security | 2014 | Computer Science |
| Seo et al. ( | 69 | Journal of Network and Computer Applications | 2014 | Computer Science |
| Yuan et al. ( | 68 | ACM Sigcomm Computer Communication Review | 2014 | Computer Science |
| Tam et al. ( | 66 | ACM Computing Surveys | 2017 | Computer Science |
| Narudin et al. ( | 65 | Soft Computing | 2016 | Computer Science |
| Rastogi et al. ( | 65 | IEEE Transactions on Information Forensics and Security | 2014 | Computer Science |
| Zheng et al. ( | 64 | 2013 12th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications (TRUSTCOM 2013) | 2013 | Computer Science |
| Feizollah et al. ( | 63 | Digital Investigation | 2015 | Computer Science |
| Yuan et al. ( | 61 | Tsinghua Science and Technology | 2016 | Computer Science |
Institutions
| Institutions | Publications | % Publication | Country |
|---|---|---|---|
| Chinese Academy of Sciences | 47 | 3.7 | China |
| Beijing University of Posts Telecommunications | 33 | 2.6 | China |
| Consiglio Nazionale Delle Ricerche Cnr | 28 | 2.2 | Italy |
| University of Sannio | 26 | 2.0 | Italy |
| Institute of Information Engineering Cas | 25 | 2.0 | China |
| Istituto Di Informatica E Telematica Iit Cnr | 23 | 1.8 | China |
| University of Chinese Academy of Sciences Cas | 21 | 1.6 | China |
| Tsinghua University | 20 | 1.6 | China |
| University of London | 20 | 1.6 | England |
| University of Luxembourg | 20 | 1.6 | Luxembourg |
| University of Padua | 19 | 1.5 | Italy |
| Pennsylvania Commonwealth System of Higher Education | 19 | 1.5 | United States |
| Universiti Malaya | 17 | 1.3 | Malaysia |
| University of California System | 16 | 1.3 | United States |
| University System of Georgia | 16 | 1.3 | United States |
| Korea University | 15 | 1.2 | Korea |
| University of Jinan | 15 | 1.2 | China |
| Nanyang Technological University | 14 | 1.1 | Singapore |
| Nanyang Technological University National Institute of Education Nie Singapore | 14 | 1.1 | Singapore |
| Centre National De La Recherche Scientifique | 13 | 1.0 | France |
| State University System of Florida | 13 | 1.0 | United States |
| Gazi University | 12 | 0.9 | Turkey |
| Inria | 12 | 0.9 | France |
| Malaviya National Institute of Technology Jaipur | 12 | 0.9 | India |
| Queens University Belfast | 12 | 0.9 | North island |
| Royal Holloway University London | 12 | 0.9 | England |
| University of New Brunswick | 12 | 0.9 | Canada |
| University of North Carolina | 12 | 0.9 | United State |
| University of Texas System | 12 | 0.9 | United State |
Impact journal of Android malware articles
| Journal | Q | C | IF | Year | ACP | References |
|---|---|---|---|---|---|---|
| IEEE Communications Surveys and Tutorials | Q1 | 111 | 22.973 | 2015 | 22.2 | Faruki et al. ( |
| IEEE Transactions on Information Forensics and Security | Q1 | 82 | 6.211 | 2014 | 13.67 | Wang et al. ( |
| Expert Systems with Applications | Q1 | 81 | 4.292 | 2014 | 13.5 | Suarez-Tangil et al. ( |
| Journal of Network and Computer Applications | Q1 | 69 | 5.273 | 2014 | 11.5 | Seo et al. ( |
| ACM Computing Surveys | Q1 | 66 | 6.131 | 2017 | 222 | Tam et al. ( |
| IEEE Transactions on Information Forensics and Security | Q1 | 65 | 6.211 | 2014 | 10.83 | Rastogi et al. ( |
| IEEE Transactions on Industrial Informatics | Q1 | 46 | 7.377 | 2018 | 23 | Li et al. ( |
| Journal of Systems and Software | Q1 | 44 | 2.559 | 2010 | 4.4 | Asaf Shabtai et al. ( |
| Soft Computing | Q2 | 65 | 2.784 | 2016 | 16.25 | Narudin et al. ( |
| Computers & Security | Q2 | 70 | 3.062 | 2014 | 11.67 | Shabtai et al. ( |
| Journal of Intelligent Information Systems | Q3 | 281 | 1.589 | 2012 | 35.13 | Asaf Shabtai et al. ( |
| ACM Sigcomm Computer Communication Review | Q3 | 68 | 1.74 | 2014 | 11.33 | Yuan et al. ( |
| Digital Investigation | Q3 | 63 | 1.66 | 2015 | 12.6 | Feizollah et al. ( |
| Tsinghua Science and Technology | Q3 | 63 | 1.696 | 2016 | 15.75 | Yuan et al. ( |
| Digital Investigation | Q3 | 56 | 1.66 | 2015 | 11.2 | Talha et al. ( |
| IET Information Security | Q3 | 52 | 0.949 | 2014 | 8.7 | Yerima et al. ( |
| IET Information Security | Q3 | 47 | 0.949 | 2015 | 9.4 | Yerima et al. ( |
| ACM SIGPLAN Notices | Q4 | 385 | 0.335 | 2014 | 64.17 | Arzt et al. ( |
| Information Security | Q4 | 132 | 0.402 | 2011 | 14.67 | Davi et al. ( |
| Computer Security—Esorics | Q4 | 57 | 0.402 | 2014 | 9.5 | Yang et al. ( |
Q quartile, C citation, IF impact factor, ACP average citation per year
Fig. 3Relationship between country, author, and keywords
Fig. 4Relationship between title with author and affiliation
Fig. 5Taxonomy of the malware detection system
The comparison between static and dynamic analyses
| Analysis technique | Static | Dynamic |
|---|---|---|
| Characteristic | ||
| Analysis mode | Offline mode | In execution of applications |
| Malware analysis | Applied Reverse engineering tools such as Apktool Using the API system to check malicious | Analyze the behavior during execution of an application It observes the malicious and error program |
| Tools used for analysis | DroidRanger Scandroid RiskRanker Stowaway AdRisk DNADroid Kirin | CrowDroid TaintDroid ParanoidAndroid Aurasium AppFence DriodScope |
| Benefit | The detection is fast | The result is more accurate |
| Limitation | It is incapable of detecting unfamiliar and new malware families | Increase power consumption and cost |
The comparison between signature and anomaly approaches
| Detection approach | Advantages | Disadvantages |
|---|---|---|
| Signature | High detection rate and accuracy for known attacks The simple and effective to detect known malware Has lower false alarm rate | Only detect the code that has a signature in the database The database needs to update frequently to detect new malware |
| Anomaly | Able to adapt and detect new, unique and abnormal malware Less dependent on an existing database | Have a higher false alarm rate due to unconfigured properly before their deployment |
Signature approach
| References | Aim | Classifier | Performance |
|---|---|---|---|
| Almin and Chatterjee ( | To propose an Android application analyzer (AAA) to identify malicious applications installed on the phone | K-Means and Naïve Bayesian | More Accurate Compared To The Anti-Virus |
| Sheen et al. ( | To design scalable mechanisms using multi-feature collaborative decision fusion (MCDF) | Naïve Bayes, J48, SVM and Ibk | TPR = 97%, Precision = 83% |
| Sharma and Gupta ( | To propose a method using machine learning for privacy risk analysis in Android applications | Bayesian network | Accuracy = 95.5% |
| Zhu et al. ( | To propose DroidDet with low cost and high efficient | Rotation forest and SVM | Accuracy = 88.3% |
| Martín et al. ( | To analyze malware using Machine learning classifier | Graph-Community Algorithm and Hierarchical Clustering | Accuracy = 84% |
SVM support vendor machine
Anomaly approach
| References | Objective | Algorithm | Result |
|---|---|---|---|
| An et al. ( | To create a robust malware detection to secure home routers | SVM | TPR = 99.8% |
| Yu et al. ( | To analyze Android application behavior using the Machine Learning method. (Dynamic) | Naïve Bayesian with Chi-square | Accuracy = 80.4% |
| Lanet et al. ( | To compare the performance of different detection approaches using different featured | SVM, HMM, (J48), and RF | HMM = 90.64% SVM = 97.33% J48 = 97% RF = 97.33% |
| Tahir et al. ( | To define and propose a new method for recognizing abnormal behaviors in network | LOC and SVM | TPR = 94.8% |
| Hu et al. ( | To propose a combination of network traffic analysis and data mining to classify malicious network behavior | SVM, KNN, and LOF | Accuracy = 81.8% |
SVM support vendor machine, HMM hidden Markov model, RF random forest, LOF local outlier factor, KNN K-nearest neighbors
Hybrid approach
| References | Objective | Algorithm | Result |
|---|---|---|---|
| Rehman et al. ( | To present detection of malware in Android Applications using signature and anomaly approach | KNN, J48, SVM, decision tree | Accuracy = 99.8% |
| Ali ( | To present a genetic algorithm (GA) and a particle swarm optimization (PSO) to fix up the optimization problem in SVM | GA and PSO | TPR = 96% |
| Venkatraman et al. ( | To examine the proposed method of hybrid image-based with deep learning architectures for effective malware classification | SVM | Accuracy = 98.6% |
| Adebayo and Aziz ( | To improve the malicious detection rate using PSO algorithm against Android | PSO | PSO Accuracy = 98.2% |
| Huda et al. ( | To introduce a hybrid structure to classify features of a large-time routine of malware behavior | SVM | Accuracy = 97.7% |
SVM support vendor machine, LOF local outlier factor, KNN K-nearest neighbors, GA genetic algorithm, PSO particle swarm optimization
Deployment and detection approach studies
| References | Deployment Approach | Detection Approach | Year |
|---|---|---|---|
| Guanghui ( | NIDS | Anomaly | 2020 |
| Yang et al. ( | NIDS | Anomaly | 2019 |
| Niazi and Faheem ( | NIDS | Anomaly | 2019 |
| Liang et al. ( | NIDS | Anomaly | 2019 |
| Besharati et al. ( | HIDS | Signature | 2019 |
| Jose et al. ( | HIDS | Anomaly | 2018 |
| Deshpande et al. ( | HIDS | Anomaly | 2018 |
| Subba et al. ( | HIDS | Anomaly | 2017 |
| (Haider et al. ( | HIDS | Anomaly | 2016 |
| Moon et al. ( | HIDS | Anomaly | 2016 |
| Koucham et al. ( | HIDS | Anomaly | 2015 |
Malware and the characteristics
| Types of malware | Characteristic |
|---|---|
| Virus | The virus spreads and infects the file and the program by executed itself |
| Worm | A worm replicates and sending itself through the network without affecting the operating system |
| Trojan horse | Trojan will disguise itself as a trustworthy program to attract a user to run it. It will distribute the virus when the program is running |
| Botnet | A Botnet spread itself through the network and allowed an attacker to control the infected computer |
| Spyware | Spyware took user information, data, and observe their activities without their knowledge |
| Rootkits | A rootkit treats the root of the system |
| Adware | Adware is an unwanted advertisement in the form of a popup or banner, and it comes from the history of the user's browser |
Fig. 6The mapping of malicious malware types and their behaviours
Risk level
| Risk level | Description |
|---|---|
| High | The risk is unacceptable and it reduces the risk implemented before running the application. The data are exposed to leakage, unsecured wifi, the presence of spyware, and phishing attacks |
| Medium | The risk is acceptable and under protection. It needs to monitor continuously for each threat to ensure the level at the normal |
| Low | The risk is acceptable and able to be used. The security is provided by the mobile devices with the relevant protection but needs to observe the threat to detect any changes that will increase the risk level |
The threat and descriptions
| Threat | Description |
|---|---|
| Application based | The threat comes from downloaded applications from the market store. The fraudulent application looks legitimate and exploits the devices once downloaded. The vulnerabilities of the devices contribute to the exploitation of the threat |
| Web based | The connection of the Internet has spurred the threat easily comes when the users used the devices to surf the website contained malware |
| Network based | The attackers usually provided open wifi to gain confidential information from the users |
| Physical based | The portable device easily lost or stolen. The value of the devices gathered with the data stored inside has encouraged the unscrupulous to get the devices physically |