A malware detection model based on imbalanced heterogeneous graph embeddings

被引:9
|
作者
Li, Tun [1 ]
Luo, Ya [1 ]
Wan, Xin [1 ]
Li, Qian [1 ]
Liu, Qilie [1 ]
Wang, Rong [1 ]
Jia, Chaolong [1 ]
Xiao, Yunpeng [1 ]
机构
[1] Chongqing Univ Posts & Telecommun, Chongqing 400065, Peoples R China
基金
中国国家自然科学基金;
关键词
Malware; Imbalanced networks; Generative adversarial networks; Heterogeneous graph; Representation learning; NEURAL-NETWORKS; SMOTE;
D O I
10.1016/j.eswa.2023.123109
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The proliferation of malware in recent years has posed a significant threat to the security of computers and mobile devices. Detecting malware, especially on the Android platform, has become a growing concern for researchers and the software industry. This paper proposes a new method for detecting Android malware based on unbalanced heterogeneous graph embedding. First of all, most malware datasets contain an imbalance of malicious and benign samples, since some types of malware are scarce and difficult to collect. Thus, as a result of this problem, the classification algorithm is unable to analyze the minority samples through sufficient data, resulting in poor downstream classifier performance, in light of the fact that adversarial generation networks possess the characteristic of completing data, an algorithm for generating graph structure data is presented, in which nodes are generated to simulate the distribution of minority nodes within a network topology. Then, considering that heterogeneous information networks have the characteristics of retaining rich node semantic features and mining implicit relationships, heterogeneous graphs are used to construct models for different types of entities (i.e. Apps, APIs, permissions, intents, etc.) and different meta-paths. Finally, a new method is introduced to alleviate the over-smoothing phenomenon of node information in the propagation of deep network. In the deep GCN, we first sample the leader nodes of each layer node, and then add a residual connection and an identity map in order to determine the characteristics of the high-order leader. In this paper, a self-attention-based semantic fusion method is also applied to adaptively fuse embedded representations of software nodes under different meta-paths. The test results demonstrate that the proposed IHODroid model effectively detects malicious software. In the DREBIN dataset, which consists of 123,453 Android applications and 5,560 malicious samples, the IHODroid model achieves an accuracy of 0.9360 and an F1 score of 0.9360, outperforming other state-of-the-art baseline methods.
引用
收藏
页数:16
相关论文
共 50 条
  • [11] Malware detection framework based on graph variational autoencoder extracted embeddings from API-call graphs
    Gunduz, Hakan
    PEERJ COMPUTER SCIENCE, 2022, 8
  • [12] Deep learning for effective Android malware detection using API call graph embeddings
    Abdurrahman Pektaş
    Tankut Acarman
    Soft Computing, 2020, 24 : 1027 - 1043
  • [13] Graph-based Malware Distributors Detection
    Venzhega, Andrei
    Zhinalieva, Polina
    Suboch, Nikolay
    PROCEEDINGS OF THE 22ND INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'13 COMPANION), 2013, : 1141 - 1144
  • [14] Deep learning for effective Android malware detection using API call graph embeddings
    Pektas, Abdurrahman
    Acarman, Tankut
    SOFT COMPUTING, 2020, 24 (02) : 1027 - 1043
  • [15] Content-Agnostic Malware Detection in Heterogeneous Malicious Distribution Graph
    Alabdulmohsin, Ibrahim
    Han, Yufei
    Shen, Yun
    Zhang, Xiangliang
    CIKM'16: PROCEEDINGS OF THE 2016 ACM CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, 2016, : 2395 - 2400
  • [16] Malware Similarity Measurement Method Based on Multiplex Heterogeneous Graph
    Gu Y.-H.
    Wang Y.-F.
    Liu W.-X.
    Wu T.-J.
    Meng G.-Z.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (07): : 3188 - 3205
  • [17] Heterogeneous graph neural networks with denoising for graph embeddings
    Dong, Xinrui
    Zhang, Yijia
    Pang, Kuo
    Chen, Fei
    Lu, Mingyu
    KNOWLEDGE-BASED SYSTEMS, 2022, 238
  • [18] A2-CLM: Few-Shot Malware Detection Based on Adversarial Heterogeneous Graph Augmentation
    Liu, Chen
    Li, Bo
    Zhao, Jun
    Feng, Weiwei
    Liu, Xudong
    Li, Chunpei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 2023 - 2038
  • [19] A malware detection method based on family behavior graph
    Ding, Yuxin
    Xia, Xiaoling
    Chen, Sheng
    Li, Ye
    COMPUTERS & SECURITY, 2018, 73 : 73 - 86
  • [20] An unknown malware detection scheme based on the features of graph
    Zhao, Zongqu
    Wang, Junfeng
    Wang, Chonggang
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (02) : 239 - 246