Performance Assessment of Android Antimalware Applications: An Experimental Approach
- Authors
-
-
Lukman MOHAMMED
Cyber Security Science Department, Federal University of Technology, Minna, Nigeria
Author
-
Victor O. WAZIRI
Cyber Security Science Department, Federal University of Technology, Minna, Nigeria
Author
-
Ismaila IDRIS
Cyber Security Science Department, Federal University of Technology, Minna, Nigeria
Author
-
Suleiman AHMAD
Cyber Security Science Department, Federal University of Technology, Minna, Nigeria
Author
-
- Keywords:
- Malware, Android, Ransomware, Antimalware, detection.
- Abstract
-
The widespread use of Android phones has made the devices the primary target for malware authors. There are many commercial antimalware tools but they are not totally effective as android users still record high false positive rate. This research evaluates the performance of five common Android antimalware tools which include Kaspersky, BitDefender, Avira, Norton and McAfee against ten ransomware samples obtained from the AndMal2017 Android dataset. The experiment was conducted using Android Studio Emulator where each of the antimalware tool was tested to ascertain the detection rate, scan time and memory usage. Experimental results indicate that BitDefender achieved the highest detection accuracy of 90% with lowest scan time of 16.2 seconds and memory usage of 146.2MB. By providing quantitative benchmarks and an emulator-based testing framework, this research contributes practical insights for both academic and industry stakeholders in mobile cybersecurity.
- References
- Downloads
- Published
- 15-11-2025
- Section
- Articles
- License
-
Copyright (c) 2025 FUDMA Journal of Engineering and Technology

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
How to Cite
Similar Articles
- Joseph A. OJENIYI, Zainab L. BELLO, Ismail IDRIS, Noel M. DOGONYARO, Suleiman AHMAD, Sikiru O. SUBAIRU, Entropy-Based Deep Learning Framework for Classifying Ransomware Families in Windows Environment , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Oluwasanmi S. ADANIGBO, Opeyemi O. ASAOLU, Adedayo A. SOBOWALE, Temidayo AKINDAHUNSI, Akinbayode A. ASAOLU, Intrusion Detection in Mobile Adhoc Networks: A Review of Signature-Based, Anomaly-Based, and Hybrid Approaches , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Yusuf T. BAFFA, Muhammad Y. MUHAMMAD, Aliyu SHUAIBU, Enhanced Detection and Classification Models for Distributed Denial-of-Service Using Time-Based Features in Cybersecurity , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Jennifer BALA, Sikiru O. SUBAIRU, Noel M. DOGONYARO, Joseph A. OJENIYI, Suleiman AHMAD, Development of an Optimized Hybrid XGBoost–GRU Model for Detection of Ponzi Schemes in Ethereum Transaction Networks , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Zainab B. LAPAI, Joseph A. OJENIYI, Ismail IDRIS, Abdulkadir O. ABDULBAKI, Jennifer BALA, Entropy-Guided Neural Architecture for Family-Level Classification of Windows Ransomware , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Abubakar L. IBRAHEEM, John K. ALHASSAN, Noel D. MOSES, Suleiman AHMAD, Development of Ensemble SVM–LSTM Model for Phishing Website Detection , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Olatunde A. AKANO, Wariz A. ISMAEL, Ayomikun A. AWOSEYI, Femi AYO, Ifeoluwa M. OLANIYI, Jide E.T. AKINSOLA, Short Messaging Service Spam Detection Model Using Natural Language Processing and Deep Learning Techniques , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Olusola K. AKINDE, Abolaji O. ILORI, Habeeb A. ARIKEWUYO, Development of a Wearable Fall Sensing Device for Enhanced Independent Living Among the Elderly , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Olawale J. OLALUYI, Johnson O. ADEOGO, Adeniyi O. AJIBOYE, Mayowa O. ORESELU, Olarewaju T. OGINNI, Application of Machine Learning for Enhancing Fake Logo Detection , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Damilare L. ADEKEYE, Uche M. IROKA, A Microcontroller-Based Intelligent Electricity Theft Detection and Prevention System , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Abubakar L. IBRAHEEM, John K. ALHASSAN, Noel D. MOSES, Suleiman AHMAD, Development of Ensemble SVM–LSTM Model for Phishing Website Detection , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Jennifer BALA, Sikiru O. SUBAIRU, Noel M. DOGONYARO, Joseph A. OJENIYI, Suleiman AHMAD, Development of an Optimized Hybrid XGBoost–GRU Model for Detection of Ponzi Schemes in Ethereum Transaction Networks , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Joseph A. OJENIYI, Zainab L. BELLO, Ismail IDRIS, Noel M. DOGONYARO, Suleiman AHMAD, Sikiru O. SUBAIRU, Entropy-Based Deep Learning Framework for Classifying Ransomware Families in Windows Environment , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
