• Ganiyat Kemi Afolabi-Yusuf Summit University Offa
  • Y. O. Olatunde Summit University Offa
  • K. Y. Obiwusi Summit University Offa
  • M. O. Yusuf Nigeria Open University, Nigeria
  • O. C. Abikoye University of Ilorin, Ilorin



Cyber security, Malgenome, Drebin, Android, Malware Detection


Android mobile devices are widely used across all platforms and the development of malicious apps can compromise a user’s mobile system. Considering the large amount of new malicious apps, there is a need for a detection system that can operate efficiently to identify these apps. The study analyzes and compares the performance of DREBIN and MALGENOME data sets with the dataset’s SMOTE version on selected machine learning algorithms using WEKA tools. The performance of bayesian, function, rule, and tree-based classification algorithms on the two datasets was explored in this work. WEKA tool was used in pre-processing and SMOTE class balancing of the datasets before the model training using different classification algorithms on the two datasets and the performance evaluation. In the performance evaluation, parameters such as accuracy, precision, f-measure, the area under cover, true positive, recall, and false positive rate were employed. According to the study, tree-based classifiers (Recursive Tree, Decision Tree and Classification and Regression Tree) algorithms have 97.24%, 98.21% and 98.21% accuracy on the Malgenome dataset and 97.30%, 97.33% & 97.28% of accuracy on Drebin dataset and functionbased classifiers (Support Vector Machine (SVM) and Logistic Regression) algorithms has 97.81% & 96.87% of accuracy on Malgenome dataset and 97.00% & 97.81% of accuracy on Drebin dataset which concludes that classifier algorithms in these groups proofed to be promising for the detection of android malware. The function-based classifier is the most outstanding method for the two datasets as it outperforms all other classifiers for both classes with 97.81% and 97.33%. SVM and Logistic Regression, are highly effective in detecting malicious Android apps, outperforming other classifier types with accuracy rates up to 97.81%. Tree-based classifiers also showed strong performance across DREBIN and MALGENOME datasets. This research underscores the potential of function-based algorithms as robust tools for enhancing mobile security against malware threats.


R. Riasat, M. Sakeena, A. H. Sadiq, and Y. J. Wang, “Onamd: An Online Android Malware Detection Approach,” Proc. - Int. Conf. Mach. Learn. Cybern., vol. 1, no. July, pp. 190–196, 2018, doi: 10.1109/ICMLC.2018.8526997.

O. C. Abikoye, U. A. Ojo, J. B. Awotunde, and R. O. Ogundokun, “A safe and secured iris template using steganography and cryptography,” pp. 23483–23506, 2020.

P. Palumbo, L. Sayfullina, D. Komashinskiy, E. Eirola, and J. Karhunen, “A pragmatic android malware detection procedure,” Comput. Secur., vol. 70, pp. 689–701, 2017, doi: 10.1016/j.cose.2017.07.013.

A. O. Christiana, B. A. Gyunka, and A. N. Oluwatobi, “Optimizing android malware detection via ensemble learning,” Int. J. Interact. Mob. Technol., vol. 14, no. 9, pp. 61–78, 2020, doi: 10.3991/ijim.v14i09.11548.

O. C. Abikoye and B. Gyunka, “The Threat of Split-Personality Android Malware on Developing Economy School of Computing , Engineering & Physical Sciences Computing and Information Systems Journal Edited by Abel Usoro,” no. February, 2018.

S. Wang et al., “Deep and broad URL feature mining for android malware detection,” Inf. Sci. (Ny)., vol. 513, pp. 600–613, 2020, doi: 10.1016/j.ins.2019.11.008.

A. Priya, S. Garg, and N. P. Tigga, “Predicting Anxiety, Depression and Stress in Modern Life using Machine Learning Algorithms,” Procedia Comput. Sci., vol. 167, no. September, pp. 1258–1267, 2020, doi: 10.1016/j.procs.2020.03.442.

R. Singh and A. Gehlot, “Review on Intrusion Detection in Edge Based IOT,” 2022 Int. Interdiscip. Humanit. Conf. Sustain., pp. 788–793, 2022, doi: 10.1109/IIHC55949.2022.10060587.

A. Saracino, D. Sgandurra, G. Dini, and F. Martinelli, “MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention,” IEEE Trans. Dependable Secur. Comput., vol. 15, no. 1, pp. 83–97, 2018, doi: 10.1109/TDSC.2016.2536605.

J. Li, L. Sun, Q. Yan, Z. Li, W. Srisa-An, and H. Ye, “Significant Permission Identification for Machine-Learning-Based Android Malware Detection,” IEEE Trans. Ind. Informatics, vol. 14, no. 7, pp. 3216–3225, 2018, doi: 10.1109/TII.2017.2789219.

D. Arp, M. Spreitzenbarth, M. Hübner, H. Gascon, and K. Rieck, “Drebin: Effective and Explainable Detection of Android Malware in Your Pocket,” no. February, pp. 23–26, 2014, doi: 10.14722/ndss.2014.23247.



How to Cite

Afolabi-Yusuf, G. K., Olatunde, Y. O., Obiwusi, K. Y., Yusuf, M. O., & Abikoye, O. C. (2024). PERFORMANCE ANALYSIS OF SELECTED CLASSIFICATION ALGORITHMS ON ANDROID MALWARE DETECTION. International Journal of Software Engineering and Computer Systems, 9(2), 140–149.