Android Malware Detection Based on Structural Features of the Function Call Graph

被引:12
|
作者
Yang, Yang [1 ,2 ]
Du, Xuehui [1 ,2 ]
Yang, Zhi [1 ,2 ]
Liu, Xing [3 ]
机构
[1] Informat Engn Univ, Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450001, Peoples R China
[2] Informat Engn Univ, Henan Prov Key Lab Informat Secur, Zhengzhou 450001, Peoples R China
[3] China Elect Standardizat Inst, Informat Secur Res Ctr, Beijing 100007, Peoples R China
基金
中国国家自然科学基金;
关键词
Android; malware detection; function call graph; graph convolutional network;
D O I
10.3390/electronics10020186
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The openness of Android operating system not only brings convenience to users, but also leads to the attack threat from a large number of malicious applications (apps). Thus malware detection has become the research focus in the field of mobile security. In order to solve the problem of more coarse-grained feature selection and larger feature loss of graph structure existing in the current detection methods, we put forward a method named DGCNDroid for Android malware detection, which is based on the deep graph convolutional network. Our method starts by generating a function call graph for the decompiled Android application. Then the function call subgraph containing the sensitive application programming interface (API) is extracted. Finally, the function call subgraphs with structural features are trained as the input of the deep graph convolutional network. Thus the detection and classification of malicious apps can be realized. Through experimentation on a dataset containing 11,120 Android apps, the method proposed in this paper can achieve detection accuracy of 98.2%, which is higher than other existing detection methods.
引用
收藏
页码:1 / 18
页数:17
相关论文
共 50 条
  • [21] Android malware detection based on overlapping of static features
    Nezhadkamali, Maryam
    Soltani, Somayeh
    Seno, Seyed Amin Hosseini
    PROCEEDINGS OF THE 2017 7TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE), 2017, : 319 - 325
  • [22] Dalvik Opcode Graph Based Android Malware Variants Detection Using Global Topology Features
    Zhang, Jixin
    Qin, Zheng
    Zhang, Kehuan
    Yin, Hui
    Zou, Jingfu
    IEEE ACCESS, 2018, 6 : 51964 - 51974
  • [23] Android malware detection method based on graph attention networks and deep fusion of multimodal features
    Chen, Shaojie
    Lang, Bo
    Liu, Hongyu
    Chen, Yikai
    Song, Yucai
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 237
  • [24] Interpretable Automatic Detection of Android Malware Based on Graph Embedding
    Wang, Yulian
    Lu, Mingming
    Computer Engineering and Applications, 2024, 57 (23) : 122 - 128
  • [25] HashDroid:Extraction of malicious features of Android applications based on function call graph pruning
    Liu, Pengfei
    Wang, Weiping
    Song, Hong
    Zhang, Shigeng
    Hong, Yulu
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 66 - 73
  • [26] Hash-Based Function Call Graph Fusion Method for IoT Malware Detection
    Lin, Gao-Yu
    Lin, Ming-Huang
    Hong, Bing-Kai
    Cheng, Shin-Ming
    2023 26TH INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS, WPMC, 2023, : 159 - 164
  • [27] Embedding vector generation based on function call graph for effective malware detection and classification
    Xiao-Wang Wu
    Yan Wang
    Yong Fang
    Peng Jia
    Neural Computing and Applications, 2022, 34 : 8643 - 8656
  • [28] Deep learning for effective Android malware detection using API call graph embeddings
    Abdurrahman Pektaş
    Tankut Acarman
    Soft Computing, 2020, 24 : 1027 - 1043
  • [29] Deep learning for effective Android malware detection using API call graph embeddings
    Pektas, Abdurrahman
    Acarman, Tankut
    SOFT COMPUTING, 2020, 24 (02) : 1027 - 1043
  • [30] Embedding vector generation based on function call graph for effective malware detection and classification
    Wu, Xiao-Wang
    Wang, Yan
    Fang, Yong
    Jia, Peng
    NEURAL COMPUTING & APPLICATIONS, 2022, 34 (11): : 8643 - 8656