International Journal of Engineering
Trends and Technology

Research Article | Open Access | Download PDF
Volume 74 | Issue 3 | Year 2026 | Article Id. IJETT-V74I3P113 | DOI : https://doi.org/10.14445/22315381/IJETT-V74I3P113

Smart TPOT-Based AutoML-Powered Android Malware Detection and Classification


Divya Recharla, M. Monisha

Received Revised Accepted Published
23 Apr 2025 27 Oct 2025 25 Nov 2025 28 Mar 2026

Citation :

Divya Recharla, M. Monisha, "Smart TPOT-Based AutoML-Powered Android Malware Detection and Classification," International Journal of Engineering Trends and Technology (IJETT), vol. 74, no. 3, pp. 169-180, 2026. Crossref, https://doi.org/10.14445/22315381/IJETT-V74I3P113

Abstract

Systems and Networks can be seriously threatened by malware, often known as malicious software. The sophistication of malware assaults is increasing, making it harder to identify and stop them, for several reasons, including the protection of private data, data loss and alteration, system interruptions, monetary losses, and reputational harm. Therefore, malware detection and prevention are essential. Various machine learning models such as Random Forest, Support Vector Machine, K-NN, Extra Tree classifier, Gradient Boosting, and AdaBoost are applied for Android malware detection, as presented in this research. A Python-based machine learning tool called Python Optimised ML Pipeline (TPOT) uses genetic programming to maximize network throughput. To retrieve static information like permissions, network calls, API calls, and system traffic from the malicious apps for Android dataset, we employ TPOT to construct models. Moreover, a comparison has been made with traditional Machine learning classifiers and Automated ML for greater performance by reduction in computational time, training speed, and efficiency. Subsequently, metrics such as precision, F1-score, Recall, and accuracy are used to evaluate the overall performance of models. The analysis proved that Automated ML provides better outcomes of 99.7% accuracy with lesser computational complexity and a reduction in training time.

Keywords

Automated Machine Learning (AutoML), Tree-based Pipeline Optimization Tool (TPOT), Gradient Boosting, ExtraTree, and AdaBoost.

References

[1] Min Yang et al., “An Android Malware Detection Model based on DT-SVM,” Security and Communication Networks, vol. 2020, no. 1, pp. 1-11, 2020.
[CrossRef] [Google Scholar] [Publisher Link]

[2] Kaijun Liu et al., “A Review of Android Malware Detection Approaches based on Machine Learning,” IEEE Access, vol. 8, pp. 124579-124607, 2020.
[CrossRef] [Google Scholar] [Publisher Link]

[3] Mohammed N. AlJarrah et al., “A Context-Aware Android Malware Detection Approach using Machine Learning,” Information, vol. 13, no. 12, pp. 1-25, 2022.
[CrossRef] [Google Scholar] [Publisher Link]

[4] Esra Calik Bayazit, Ozgur Koray Sahingoz, and Buket Dogan, “Malware Detection in Android Systems with Traditional Machine Learning Models: A Survey,” 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), Ankara, Turkey, pp. 1-8, 2020.
[CrossRef] [Google Scholar] [Publisher Link]

[5] A. Ananya et al., “SysDroid: A Dynamic ML-based Android Malware Analyzer using System Call Traces,” Cluster Computing, vol. 23, no. 4, pp. 2789-2808, 2020.
[CrossRef] [Google Scholar] [Publisher Link]

[6] Modupe Odusami et al., “Android Malware Detection: A Survey,” Applied Informatics: First International Conference, Bogotá, Colombia, pp. 255-266, 2018.
[
CrossRef] [Google Scholar] [Publisher Link]

[7] Francisco Nauber Bernardo Gois, Joao Alexandre Lobo Marques, and Simon James Fong, TPOT Automated Machine Learning Approach for Multiple Diagnostic Classification of Lung Radiography and Feature Extraction, Computerized Systems for Diagnosis and Treatment of COVID-19, pp. 117-135, 2023.
[CrossRef] [Google Scholar] [Publisher Link]

[8] Nayana N. Murthy, and K. Thippeswamy, “TPOT with SVM Hybrid Machine Learning Model for Lung Cancer Classification using CT Image,” Biomedical Signal Processing and Control, vol. 104, 2025.
[CrossRef] [Google Scholar] [Publisher Link]

[9] Amarjyoti Pathak, Utpal Barman, and Th. Shanta Kumar, “Machine Learning Approach to Detect Android Malware using Feature-Selection based on Feature Importance Score,” Journal of Engineering Research, vol. 13, no. 2, pp. 712-720, 2025.
[CrossRef] [Google Scholar] [Publisher Link]

[10] Matilda Rhode, Pete Burnap, and Kevin Jones, “Early-Stage Malware Prediction using Recurrent Neural Networks,” Computers& Security, vol. 77, pp. 578-594, 2018.
[CrossRef] [Google Scholar] [Publisher Link]

[11] Abdulsamad E. Yahya et al., “A Novel Hybrid Deep Learning Model for Detecting and Classifying Non-Functional Requirements of Mobile Apps Issues,” Electronics, vol. 12, no. 5, pp. 1-22, 2023.
[CrossRef] [Google Scholar] [Publisher Link]

[12] Seungho Jeon, and Jongsub Moon, “Malware-Detection Method with a Convolutional Recurrent Neural Network using Opcode Sequences,” Information Sciences, vol. 535, pp. 1-15, 2020.
[
CrossRef] [Google Scholar] [Publisher Link]

[13] Abdulghani Ali Ahmed et al., “Deep Learning-based Classification Model for Botnet Attack Detection,” Journal of Ambient Intelligence and Humanized Computing, vol. 13, no. 7, pp. 3457-3466, 2022.
[CrossRef] [Google Scholar] [Publisher Link]

[14] Jaehyeong Lee et al., “Android Malware Detection using Machine Learning with Feature Selection based on the Genetic Algorithm,” Mathematics, vol. 9, no. 21, pp. 1-20, 2021.
[CrossRef] [Google Scholar] [Publisher Link]

[15] Hee-Yong Kwon, Taesic Kim, and Mun-Kyu Lee, “Advanced Intrusion Detection Combining Signature based and Behavior-based Detection Methods,” Electronics, vol. 11, no. 6, pp. 1-19, 2022.
[
CrossRef] [Google Scholar] [Publisher Link]

[16] Durmuş Özkan Şahin et al., “A Novel Permission-based Android Malware Detection System using Feature Selection based on Linear Regression,” Neural Computing and Applications, vol. 35, pp. 7, pp. 4903-4918, 2023.
[CrossRef] [Google Scholar] [Publisher Link]

[17] K. Santosh Jhansi, Sujata Chakravarty, and P. Ravi Kiran Varma, “Feature Selection and Evaluation of Permission-based Android Malware Detection,” 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184), Tirunelveli, India, pp. 795-799, 2020.
[
CrossRef] [Google Scholar] [Publisher Link]

[18] Yuxin Ding et al., “Android Malware Detection Method based on Bytecode Image,” Journal of Ambient Intelligence and Humanized Computing, vol. 14, no. 5, pp. 6401-6410, 2020.
[CrossRef] [Google Scholar] [Publisher Link]

[19] Ya Pan et al., “A Systematic Literature Review of Android Malware Detection using Static Analysis,” IEEE Access, vol. 8, pp. 116363-116379, 2020.
[
CrossRef] [Google Scholar] [Publisher Link]

[20] C.W. Colaco et al., “Defensedroid: A Modern Approach to Android Malware Detection,” Strad Research, vol. 8, no. 5, pp. 271-282, 2021.
[Google Scholar]

[21] Abdelouahab Amira et al., “TriDroid: A Triage and Classification Framework for Fast Detection of Mobile Threats in Android Markets,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, no. 2, pp. 1731-1755, 2021.
[CrossRef] [Google Scholar] [Publisher Link]

[22] A. Jyothish, Ashik Mathew, and P. Vinod, “Effectiveness of Machine Learning based Android Malware Detectors against Adversarial Attacks,” Cluster Computing, vol. 27, no. 3, pp. 2549-2569, 2024.
[CrossRef] [Google Scholar] [Publisher Link]

[23] Rinanza Zulmy Alhamri et al., “Supervised Learning Methods Comparison for Android Malware Detection based on System Calls Referring to ARM (32-bit/EABI) Table,” Journal of Information Technology and Cyber Security, vol. 2, no. 1, pp. 15-24, 2024.
[CrossRef] [Google Scholar] [Publisher Link]

[24] Fadare Oluwaseun Gbenga, Adetunmbi Adebayo Olusola, and Oyinloye Oghenerukevwe Elohor, “Towards Optimization of Malware Detection using Extra-Tree and Random Forest Feature Selections on Ensemble Classifiers,” International Journal of Recent Technology and Engineering (IJRTE), vol. 9, no. 6, pp. 223-232, 2021.
[CrossRef] [Google Scholar] [Publisher Link]

[25] Zhenshuo Chen, Eoin Brophy, and Tomas Ward, “Malware Classification using Static Disassembly and Machine Learning,” arXiv preprint, pp. 1-9, 2021.
[CrossRef] [Google Scholar] [Publisher Link]

[26] G. Revathy et al., “CancerAI: A Deep Learning Framework for Ovarian Cancer Prediction,” 2024 5th International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, pp. 1318-1323, 2024.
[CrossRef] [Google Scholar] [Publisher Link]

[27] Jianting Yuan et al., “Malicious URL Detection based on a Parallel Neural Joint Model,” IEEE Access, vol. 9, pp. 9464-9472, 2021.
        [CrossRef] [Google Scholar] [Publisher Link]