{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T06:36:18Z","timestamp":1763706978968,"version":"3.41.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T00:00:00Z","timestamp":1734307200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T00:00:00Z","timestamp":1734307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2025,6]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Android devices have evolved to offer a diverse array of services, spanning applications related to banking, business, health, and entertainment. The widespread adoption of Android devices, coupled with the open-source architecture of the Android operating system, has rendered them a prime target for malicious actors. Among the most perilous threats are Android botnets, which enable malicious actors, often referred to as botmasters, to exert remote control for the execution of destructive attacks. Android botnets have huge potential to be an emerging threat to mobile device security. In this paper, we focus on detecting evolving Android botnets and introduce a new dataset of 3458 apps, represented by 455 permission-based features. We propose an improved multilayer perceptron neural network for zero-day botnet detection. Our methodology, in this way, achieves an accuracy of 98.5%, thus outperforming traditional classifiers. It has a lot of functionality and is based on the neural network approach, making it able to identify slight botnet behaviours in order to improve Android security.<\/jats:p>","DOI":"10.1007\/s00521-024-10818-7","type":"journal-article","created":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T04:58:11Z","timestamp":1734325091000},"page":"10795-10805","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Zero-day Android botnet detection using neural networks"],"prefix":"10.1007","volume":"37","author":[{"given":"Saeed","family":"Seraj","sequence":"first","affiliation":[]},{"given":"Elias","family":"Pimenidis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6607-422X","authenticated-orcid":false,"given":"Marcello","family":"Trovati","sequence":"additional","affiliation":[]},{"given":"Nikolaos","family":"Polatidis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,16]]},"reference":[{"key":"10818_CR1","first-page":"102735","volume":"58","author":"JF Alqatawna","year":"2021","unstructured":"Alqatawna JF, Ala\u2019M AZ, Hassonah MA, Faris H (2021) Android botnet detection using machine learning models based on a comprehensive static analysis approach. J Inf Secur Appl 58:102735","journal-title":"J Inf Secur Appl"},{"key":"10818_CR2","doi-asserted-by":"crossref","unstructured":"Alothman B, Rattadilok P (2017) Android botnet detection: an integrated source code mining approach. In: 2017 12th international conference for internet technology and secured transactions (ICITST), IEEE, pp 111\u2013115","DOI":"10.23919\/ICITST.2017.8356358"},{"key":"10818_CR3","unstructured":"https:\/\/www.kaspersky.com\/about\/press-releases"},{"issue":"1","key":"10818_CR4","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s12530-020-09362-1","volume":"13","author":"S Hosseini","year":"2022","unstructured":"Hosseini S, Nezhad AE, Seilani H (2022) Botnet detection using negative selection algorithm, convolution neural network and classification methods. Evol Syst 13(1):101\u2013115","journal-title":"Evol Syst"},{"issue":"4.15","key":"10818_CR5","first-page":"103","volume":"7","author":"M Yusof","year":"2018","unstructured":"Yusof M, Saudi MM, Ridzuan F (2018) Mobile botnet classification by using hybrid analysis. Int J Eng Technol (UAE). 7(4.15):103","journal-title":"Int J Eng Technol (UAE)."},{"key":"10818_CR6","unstructured":"Yusof M, Saudi MM, Ridzuan F Android botnet detection using risk assessment"},{"issue":"2","key":"10818_CR7","first-page":"32","volume":"3","author":"S Balasunthar","year":"2022","unstructured":"Balasunthar S, Abdullah Z (2022) Comparison of convolutional neural network and artificial neural network for android botnet attack detection. Appl Inf Technol Comput Sci 3(2):32\u201349","journal-title":"Appl Inf Technol Comput Sci"},{"key":"10818_CR8","doi-asserted-by":"crossref","unstructured":"Seraj S, Pimenidis E, Pavlidis M, Kapetanakis S, Trovati M, Polatidis N (2023) BotDroid: permission-based android botnet detection using neural networks. In: International conference on engineering applications of neural networks, Cham: Springer Nature Switzerland, pp 71\u201384","DOI":"10.1007\/978-3-031-34204-2_7"},{"issue":"2","key":"10818_CR9","first-page":"519","volume":"2","author":"S Baruah","year":"2019","unstructured":"Baruah S (2019) Botnet detection: analysis of various techniques. Int J Comput Intell & IoT 2(2):519","journal-title":"Int J Comput Intell & IoT"},{"key":"10818_CR10","doi-asserted-by":"crossref","unstructured":"Tansettanakorn C, Thongprasit S, Thamkongka S, Visoottiviseth V (2016) ABIS: a prototype of android botnet identification system. In\u00a02016 Fifth ICT international student project conference (ICT-ISPC), IEEE, pp 1\u20135","DOI":"10.1109\/ICT-ISPC.2016.7519221"},{"key":"10818_CR11","doi-asserted-by":"crossref","unstructured":"Kothari S, Joshi S (2020) Analysis of android applications to detect botnet attacks. In: 2020 international conference on smart innovations in design, environment, management, planning and computing (ICSIDEMPC), IEEE, pp 144\u2013150","DOI":"10.1109\/ICSIDEMPC49020.2020.9299580"},{"key":"10818_CR12","unstructured":"Yerima SY, To Y (xxxx) A deep learning-enhanced botnet detection system based on Android manifest text mining"},{"key":"10818_CR13","doi-asserted-by":"crossref","unstructured":"Arp D, Spreitzenbarth M, Hubner M, Gascon H, Rieck K, Siemens CERT (2014) Drebin: effective and explainable detection of android malware in your pocket. In: Ndss, vol. 14, pp 23\u201326","DOI":"10.14722\/ndss.2014.23247"},{"key":"10818_CR14","doi-asserted-by":"crossref","unstructured":"Yusof M, Saudi MM, Ridzuan F (2017) A new mobile botnet classification based on permission and API calls. In: 2017 Seventh international conference on emerging security technologies (EST), IEEE, pp 122\u2013127","DOI":"10.1109\/EST.2017.8090410"},{"key":"10818_CR15","doi-asserted-by":"crossref","unstructured":"Anwar S, Zain JM, Inayat Z, Haq RU, Karim A, Jabir AN (2016) A static approach towards mobile botnet detection. In: 2016 3rd international conference on electronic design (ICED), IEEE, pp 563\u2013567","DOI":"10.1109\/ICED.2016.7804708"},{"key":"10818_CR16","doi-asserted-by":"crossref","unstructured":"Hojjatinia S, Hamzenejadi S, Mohseni H (2020) Android botnet detection using convolutional neural networks. In: 2020 28th Iranian conference on electrical engineering (ICEE), IEEE, pp 1\u20136","DOI":"10.1109\/ICEE50131.2020.9260674"},{"issue":"3","key":"10818_CR17","doi-asserted-by":"publisher","first-page":"486","DOI":"10.3390\/electronics11030486","volume":"11","author":"SY Yerima","year":"2022","unstructured":"Yerima SY, Bashar A (2022) A novel Android botnet detection system using image-based and manifest file features. Electronics 11(3):486","journal-title":"Electronics"},{"key":"10818_CR18","doi-asserted-by":"crossref","unstructured":"Abdul Kadir AF, Stakhanova N, Ghorbani AA (2015) Android botnets: what URLs are telling us. In: International conference on network and system security, Springer, Cham, pp 78\u201391","DOI":"10.1007\/978-3-319-25645-0_6"},{"key":"10818_CR19","doi-asserted-by":"crossref","unstructured":"Yerima SY, Bashar A (2021) Bot-IMG: a framework for image-based detection of Android botnets using machine learning. In: 2021 IEEE\/ACS 18th international conference on computer systems and applications (AICCSA), IEEE, pp 1\u20137","DOI":"10.1109\/AICCSA53542.2021.9686850"},{"issue":"4","key":"10818_CR20","doi-asserted-by":"publisher","first-page":"519","DOI":"10.3390\/electronics10040519","volume":"10","author":"SY Yerima","year":"2021","unstructured":"Yerima SY, Alzaylaee MK, Shajan A (2021) Deep learning techniques for android botnet detection. Electronics 10(4):519","journal-title":"Electronics"},{"key":"10818_CR21","doi-asserted-by":"crossref","unstructured":"Pieterse H, Olivier MS (2012) Android botnets on the rise: trends and characteristics. In: 2012 information security for South Africa, IEEE, pp 1\u20135","DOI":"10.1109\/ISSA.2012.6320432"},{"key":"10818_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106988","volume":"222","author":"M Moodi","year":"2021","unstructured":"Moodi M, Ghazvini M, Moodi H (2021) A hybrid intelligent approach to detect android botnet using smart self-adaptive learning-based PSO-SVM. Knowl-Based Syst 222:106988","journal-title":"Knowl-Based Syst"},{"key":"10818_CR23","doi-asserted-by":"crossref","unstructured":"da Costa VG, Barbon S, Miani RS, Rodrigues JJ, Zarpel\u00e3o BB (2017) Detecting mobile botnets through machine learning and system calls analysis. In: 2017 IEEE international conference on communications (ICC), IEEE, pp 1\u20136","DOI":"10.1109\/ICC.2017.7997390"},{"key":"10818_CR24","doi-asserted-by":"crossref","unstructured":"Girei DA, Shah MA, Shahid MB (2016) An enhanced botnet detection technique for mobile devices using log analysis. In: 2016 22nd international conference on automation and computing (ICAC), IEEE, pp 450\u2013455","DOI":"10.1109\/IConAC.2016.7604961"},{"key":"10818_CR25","doi-asserted-by":"crossref","unstructured":"Jadhav S, Dutia S, Calangutkar K, Oh T, Kim YH, Kim JN (2015) Cloud-based android botnet malware detection system. In: 2015 17th international conference on advanced communication technology (ICACT), IEEE, pp 347\u2013352","DOI":"10.1109\/ICACT.2015.7224817"},{"issue":"18","key":"10818_CR26","doi-asserted-by":"publisher","first-page":"15165","DOI":"10.1007\/s00521-021-06755-4","volume":"34","author":"S Seraj","year":"2022","unstructured":"Seraj S, Khodambashi S, Pavlidis M, Polatidis N (2022) HamDroid: permission-based harmful android anti-malware detection using neural networks. Neural Comput Appl 34(18):15165\u201315174","journal-title":"Neural Comput Appl"},{"key":"10818_CR27","doi-asserted-by":"crossref","unstructured":"Oh T, Jadhav S, Kim YH (2015) Android botnet categorization and family detection based on behavioural and signature data. In: 2015 international conference on information and communication technology convergence (ICTC), IEEE, pp 647\u2013652","DOI":"10.1109\/ICTC.2015.7354630"},{"key":"10818_CR28","unstructured":"https:\/\/www.kaggle.com\/datasets\/saeedseraj\/zero-day-android-botnet-detection-using-nn"},{"key":"10818_CR29","unstructured":"VirusTotal. Free online virus, malware and URL scanner, https:\/\/www.virustotal.com\/"},{"issue":"1","key":"10818_CR30","first-page":"127","volume":"25","author":"MM Rasheed","year":"2020","unstructured":"Rasheed MM, Faieq AK, Hashim AA (2020) Android botnet detection using machine learning. Ing\u00e9nierie Syst D Inf 25(1):127\u2013130","journal-title":"Ing\u00e9nierie Syst D Inf"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-024-10818-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-024-10818-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-024-10818-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T09:15:46Z","timestamp":1748682946000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-024-10818-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,16]]},"references-count":30,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["10818"],"URL":"https:\/\/doi.org\/10.1007\/s00521-024-10818-7","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"type":"print","value":"0941-0643"},{"type":"electronic","value":"1433-3058"}],"subject":[],"published":{"date-parts":[[2024,12,16]]},"assertion":[{"value":"19 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 November 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 December 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}}]}}