A malware detection model based on imbalanced heterogeneous graph embeddings

被引:9
|
作者
Li, Tun [1 ]
Luo, Ya [1 ]
Wan, Xin [1 ]
Li, Qian [1 ]
Liu, Qilie [1 ]
Wang, Rong [1 ]
Jia, Chaolong [1 ]
Xiao, Yunpeng [1 ]
机构
[1] Chongqing Univ Posts & Telecommun, Chongqing 400065, Peoples R China
基金
中国国家自然科学基金;
关键词
Malware; Imbalanced networks; Generative adversarial networks; Heterogeneous graph; Representation learning; NEURAL-NETWORKS; SMOTE;
D O I
10.1016/j.eswa.2023.123109
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The proliferation of malware in recent years has posed a significant threat to the security of computers and mobile devices. Detecting malware, especially on the Android platform, has become a growing concern for researchers and the software industry. This paper proposes a new method for detecting Android malware based on unbalanced heterogeneous graph embedding. First of all, most malware datasets contain an imbalance of malicious and benign samples, since some types of malware are scarce and difficult to collect. Thus, as a result of this problem, the classification algorithm is unable to analyze the minority samples through sufficient data, resulting in poor downstream classifier performance, in light of the fact that adversarial generation networks possess the characteristic of completing data, an algorithm for generating graph structure data is presented, in which nodes are generated to simulate the distribution of minority nodes within a network topology. Then, considering that heterogeneous information networks have the characteristics of retaining rich node semantic features and mining implicit relationships, heterogeneous graphs are used to construct models for different types of entities (i.e. Apps, APIs, permissions, intents, etc.) and different meta-paths. Finally, a new method is introduced to alleviate the over-smoothing phenomenon of node information in the propagation of deep network. In the deep GCN, we first sample the leader nodes of each layer node, and then add a residual connection and an identity map in order to determine the characteristics of the high-order leader. In this paper, a self-attention-based semantic fusion method is also applied to adaptively fuse embedded representations of software nodes under different meta-paths. The test results demonstrate that the proposed IHODroid model effectively detects malicious software. In the DREBIN dataset, which consists of 123,453 Android applications and 5,560 malicious samples, the IHODroid model achieves an accuracy of 0.9360 and an F1 score of 0.9360, outperforming other state-of-the-art baseline methods.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] Heterogeneous Graph Interaction based Event Extraction with Attentional Position Embeddings
    Guo, Xin
    Wang, Xuejing
    Chen, Qian
    Wang, Suge
    Zheng, Jianxing
    Liao, Jian
    Liu, Hui
    2023 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, IJCNN, 2023,
  • [32] HertDroid: Android Malware Detection Method with Influential Node Filter and Heterogeneous Graph Transformer
    Meng, Xinyi
    Li, Daofeng
    APPLIED SCIENCES-BASEL, 2024, 14 (08):
  • [33] Spectral-Based Directed Graph Network for Malware Detection
    Zhang, Zikai
    Li, Yidong
    Dong, Hairong
    Gao, Honghao
    Jin, Yi
    Wang, Wei
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (02): : 957 - 970
  • [34] Clustering based opcode graph generation for malware variant detection
    Wai, Fok Kar
    Thing, Vrizlynn L. L.
    2021 18TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2021,
  • [35] Interpretable Automatic Detection of Android Malware Based on Graph Embedding
    Wang, Yulian
    Lu, Mingming
    Computer Engineering and Applications, 2024, 57 (23) : 122 - 128
  • [36] Structural Attack against Graph Based Android Malware Detection
    Zhao, Kaifa
    Zhou, Hao
    Zhu, Yulin
    Zhan, Xian
    Zhou, Kai
    Li, Jianfeng
    Yu, Le
    Yuan, Wei
    Luo, Xiapu
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 3218 - 3235
  • [37] Graph-based malware detection using dynamic analysis
    Anderson, Blake
    Quist, Daniel
    Neil, Joshua
    Storlie, Curtis
    Lane, Terran
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2011, 7 (04): : 247 - 258
  • [38] Graph-Based Malware Detection Using Opcode Sequences
    Gulmez, Sibel
    Sogukpinar, Ibrahim
    9TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS'21), 2021,
  • [39] A graph-based model for malware detection and classification using system-call groups
    Nikolopoulos S.D.
    Polenakis I.
    Journal of Computer Virology and Hacking Techniques, 2017, 13 (1) : 29 - 46
  • [40] MG-DVD: A Real-time Framework for Malware Variant Detection Based on Dynamic Heterogeneous Graph Learning
    Liu, Chen
    Li, Bo
    Zhao, Jun
    Su, Ming
    Liu, Xu-Dong
    PROCEEDINGS OF THE THIRTIETH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, IJCAI 2021, 2021, : 1512 - 1519