Detection of Evasive Android Malware Using EigenGCN

被引:1
|
作者
John, Teenu S. [1 ]
Thomas, Tony [2 ]
Emmanuel, Sabu [3 ]
机构
[1] Cochin Univ Sci & Technol, Res Ctr, Indian Inst Informat Technol & Management Kerala, Kazhakkoottam, India
[2] Kerala Univ Digital Sci Innovat & Technol, Trivandrum, India
[3] Singapore Inst Technol, 10 Dover Dr, Singapore 138683, Singapore
关键词
Android malware; Mimicry attacks; Graph convolutional networks; Adversarial malware; System calls; DETECTION SYSTEM;
D O I
10.1016/j.jisa.2024.103880
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently there is an upsurge in Android malware that use obfuscation and repackaging techniques for evasion. Malware may also combine both these techniques to create stealthy adversarial mimicry samples to launch mimicry attacks. In mimicry attacks, the adversary makes sure that the static and dynamic features present in the crafted malware mimics the features present in the legitimate applications. In such cases, the existing detection mechanisms may become less effective. We found that the malicious nature of Android applications can be determined by identifying certain subgraphs that appear in their system call graphs. These subgraphs can be determined with the help of spectral clustering mechanism present in EigenGCN. With this, the system call graph G will be partitioned into two subgraphs G(1) and G(2), in which the malicious functionality if any will be present in the subgraph G(1). The graph Fourier transform based pooling technique in EigenGCN then computes the features of the subgraphs in the form of graph signals. This graph signals serve as a robust signature to detect malware. The proposed mechanism gave an accuracy of 98.7% on common malware, 97.3% on obfuscated malware, 97.8% on repackaged malware, and 90% on adversarial mimicry malware datasets. As far as we know, this is the first work that proposes a malware detection mechanism, that can detect common as well as obfuscated, repackaged, and mimicry malware in Android.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Android Malware Detection Using Complex-Flows
    Shen, Feng
    Del Vecchio, Justin
    Mohaisen, Aziz
    Ko, Steven Y.
    Ziarek, Lukasz
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2019, 18 (06) : 1231 - 1245
  • [22] Towards Android Malware Detection using Intelligent Agents
    Alzahrani, Abdullah J.
    Ghorbani, Ali A.
    2016 2ND INTERNATIONAL SYMPOSIUM ON AGENT, MULTI-AGENT SYSTEMS AND ROBOTICS (ISAMSR), 2016, : 1 - 8
  • [23] PermPair: Android Malware Detection Using Permission Pairs
    Arora, Anshul
    Peddoju, Sateesh K.
    Conti, Mauro
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 1968 - 1982
  • [24] Hybrid Detection Using Permission Analysis for Android Malware
    Jiao, Haofeng
    Li, Xiaohong
    Zhang, Lei
    Xu, Guangquan
    Feng, Zhiyong
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 541 - 545
  • [25] Automated Android Malware Detection Using User Feedback
    Duque, Joao
    Mendes, Goncalo
    Nunes, Luis
    de Almeida, Ana
    Serrao, Carlos
    SENSORS, 2022, 22 (17)
  • [26] Android Malware Detection Using Machine Learning Technique
    Sabri, Nor ‘Afifah
    Khamis, Shakiroh
    Zainudin, Zanariah
    Lecture Notes on Data Engineering and Communications Technologies, 2024, 211 : 153 - 164
  • [27] Towards the Detection of Android Malware using Ensemble Features
    Aswini, A. M.
    Vinod, P.
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2015, 10 (01): : 14 - 26
  • [28] Android Malware Detection using Complex-Flows
    Shen, Feng
    Del Vecchio, Justin
    Mohaisen, Aziz
    Ko, Steven Y.
    Ziarek, Lukasz
    2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017), 2017, : 2430 - 2437
  • [29] Android Malware Detection Using TCN with Bytecode Image
    Zhang, Wenhui
    Luktarhan, Nurbol
    Ding, Chao
    Lu, Bei
    SYMMETRY-BASEL, 2021, 13 (07):
  • [30] Android Malware Detection Using Ensemble Feature Learning
    Rout, Siddhartha Suman
    Vashishtha, Lalit Kumar
    Chatterjee, Kakali
    Rout, Jitendra Kumar
    INFORMATION SYSTEMS AND MANAGEMENT SCIENCE, ISMS 2021, 2023, 521 : 531 - 539