Research Article | Open Access | Download PDF
Volume 74 | Issue 3 | Year 2026 | Article Id. IJETT-V74I3P113 | DOI : https://doi.org/10.14445/22315381/IJETT-V74I3P113Smart TPOT-Based AutoML-Powered Android Malware Detection and Classification
Divya Recharla, M. Monisha
| Received | Revised | Accepted | Published |
|---|---|---|---|
| 23 Apr 2025 | 27 Oct 2025 | 25 Nov 2025 | 28 Mar 2026 |
Citation :
Divya Recharla, M. Monisha, "Smart TPOT-Based AutoML-Powered Android Malware Detection and Classification," International Journal of Engineering Trends and Technology (IJETT), vol. 74, no. 3, pp. 169-180, 2026. Crossref, https://doi.org/10.14445/22315381/IJETT-V74I3P113
Abstract
Systems and Networks can be seriously threatened by malware, often known as malicious software. The sophistication of malware assaults is increasing, making it harder to identify and stop them, for several reasons, including the protection of private data, data loss and alteration, system interruptions, monetary losses, and reputational harm. Therefore, malware detection and prevention are essential. Various machine learning models such as Random Forest, Support Vector Machine, K-NN, Extra Tree classifier, Gradient Boosting, and AdaBoost are applied for Android malware detection, as presented in this research. A Python-based machine learning tool called Python Optimised ML Pipeline (TPOT) uses genetic programming to maximize network throughput. To retrieve static information like permissions, network calls, API calls, and system traffic from the malicious apps for Android dataset, we employ TPOT to construct models. Moreover, a comparison has been made with traditional Machine learning classifiers and Automated ML for greater performance by reduction in computational time, training speed, and efficiency. Subsequently, metrics such as precision, F1-score, Recall, and accuracy are used to evaluate the overall performance of models. The analysis proved that Automated ML provides better outcomes of 99.7% accuracy with lesser computational complexity and a reduction in training time.
Keywords
Automated Machine Learning (AutoML), Tree-based Pipeline Optimization Tool (TPOT), Gradient Boosting, ExtraTree, and AdaBoost.
References
[1] Min Yang et al., “An
Android Malware Detection Model based on DT-SVM,” Security and Communication Networks, vol. 2020, no. 1, pp. 1-11,
2020.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Kaijun Liu et al., “A
Review of Android Malware Detection Approaches based on Machine Learning,” IEEE Access, vol. 8, pp. 124579-124607,
2020.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Mohammed N. AlJarrah et
al., “A Context-Aware Android Malware Detection Approach using Machine
Learning,” Information, vol. 13, no.
12, pp. 1-25, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Esra
Calik Bayazit, Ozgur Koray Sahingoz, and Buket Dogan, “Malware Detection in
Android Systems with Traditional Machine Learning Models: A Survey,” 2020 International Congress on
Human-Computer Interaction, Optimization and Robotic Applications (HORA),
Ankara, Turkey, pp. 1-8, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[5] A.
Ananya et al., “SysDroid: A Dynamic ML-based Android Malware Analyzer using
System Call Traces,” Cluster Computing, vol. 23, no. 4, pp. 2789-2808, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Modupe Odusami et al., “Android
Malware Detection: A Survey,” Applied Informatics: First International
Conference, Bogotá,
Colombia, pp. 255-266, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Francisco
Nauber Bernardo Gois, Joao Alexandre Lobo Marques, and Simon James Fong, TPOT Automated Machine Learning Approach
for Multiple Diagnostic Classification of Lung Radiography
and Feature Extraction, Computerized Systems for Diagnosis and
Treatment of COVID-19, pp. 117-135, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Nayana
N. Murthy, and K. Thippeswamy, “TPOT with SVM Hybrid Machine Learning Model for
Lung Cancer Classification using CT Image,” Biomedical
Signal Processing and Control, vol. 104, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Amarjyoti
Pathak, Utpal Barman, and Th. Shanta Kumar, “Machine Learning Approach to
Detect Android Malware using Feature-Selection based on Feature Importance
Score,” Journal of Engineering Research,
vol. 13, no. 2, pp. 712-720, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Matilda Rhode, Pete Burnap, and Kevin Jones, “Early-Stage
Malware Prediction using Recurrent Neural Networks,” Computers&
Security, vol. 77, pp.
578-594, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Abdulsamad
E. Yahya et al., “A Novel Hybrid Deep Learning Model for Detecting and
Classifying Non-Functional Requirements of Mobile Apps Issues,” Electronics, vol. 12, no. 5, pp. 1-22,
2023.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Seungho
Jeon, and Jongsub Moon, “Malware-Detection Method with a Convolutional
Recurrent Neural Network using Opcode Sequences,” Information Sciences, vol. 535, pp. 1-15, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Abdulghani
Ali Ahmed et al., “Deep Learning-based Classification Model for Botnet Attack
Detection,” Journal of Ambient
Intelligence and Humanized
Computing, vol. 13, no. 7, pp. 3457-3466, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Jaehyeong
Lee et al., “Android Malware Detection using Machine Learning with Feature
Selection based on the Genetic Algorithm,” Mathematics,
vol. 9, no. 21, pp. 1-20, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Hee-Yong
Kwon, Taesic Kim, and Mun-Kyu Lee, “Advanced Intrusion Detection Combining
Signature based and Behavior-based Detection Methods,” Electronics, vol. 11, no. 6, pp. 1-19, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Durmuş Özkan Şahin et al., “A Novel Permission-based Android
Malware Detection System using Feature Selection based on Linear
Regression,” Neural Computing and Applications, vol. 35, pp. 7, pp.
4903-4918, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[17] K. Santosh Jhansi, Sujata Chakravarty, and P. Ravi Kiran
Varma, “Feature Selection and Evaluation of Permission-based Android Malware
Detection,” 2020 4th International Conference on Trends in
Electronics and Informatics (ICOEI)(48184), Tirunelveli, India, pp. 795-799, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Yuxin Ding et al., “Android Malware Detection Method based on
Bytecode Image,” Journal of Ambient Intelligence and Humanized
Computing, vol. 14, no. 5,
pp. 6401-6410, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Ya Pan et al., “A Systematic Literature Review of Android
Malware Detection using Static Analysis,” IEEE Access, vol. 8, pp. 116363-116379, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[20] C.W. Colaco et al., “Defensedroid: A Modern Approach to
Android Malware Detection,” Strad Research, vol. 8, no. 5, pp. 271-282, 2021.
[Google Scholar]
[21] Abdelouahab Amira et al., “TriDroid: A Triage and Classification Framework for Fast
Detection of Mobile Threats in Android Markets,” Journal of Ambient
Intelligence and Humanized Computing, vol.
12, no. 2, pp. 1731-1755, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[22] A. Jyothish, Ashik Mathew, and P. Vinod, “Effectiveness of
Machine Learning based Android Malware Detectors against Adversarial
Attacks,” Cluster Computing, vol.
27, no. 3, pp. 2549-2569, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Rinanza Zulmy Alhamri et al., “Supervised Learning Methods Comparison for Android Malware
Detection based on System Calls Referring to ARM (32-bit/EABI) Table,” Journal of Information Technology and Cyber
Security, vol. 2, no. 1, pp. 15-24, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Fadare
Oluwaseun Gbenga, Adetunmbi Adebayo Olusola, and Oyinloye Oghenerukevwe Elohor, “Towards Optimization of
Malware Detection using Extra-Tree and Random Forest Feature Selections on
Ensemble Classifiers,” International Journal
of Recent Technology and Engineering (IJRTE),
vol. 9, no. 6, pp. 223-232, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Zhenshuo Chen, Eoin Brophy, and Tomas Ward, “Malware
Classification using Static Disassembly and Machine Learning,” arXiv preprint, pp. 1-9, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[26] G. Revathy et al., “CancerAI: A Deep Learning Framework
for Ovarian Cancer Prediction,” 2024 5th
International Conference on Electronics and Sustainable Communication Systems
(ICESC), Coimbatore, India, pp. 1318-1323, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Jianting Yuan et al., “Malicious URL Detection based on a Parallel
Neural Joint Model,” IEEE Access, vol.
9, pp. 9464-9472, 2021.
[CrossRef]
[Google Scholar] [Publisher Link]