Detection of Evasive Android Malware Using EigenGCN

被引:1
|
作者
John, Teenu S. [1 ]
Thomas, Tony [2 ]
Emmanuel, Sabu [3 ]
机构
[1] Cochin Univ Sci & Technol, Res Ctr, Indian Inst Informat Technol & Management Kerala, Kazhakkoottam, India
[2] Kerala Univ Digital Sci Innovat & Technol, Trivandrum, India
[3] Singapore Inst Technol, 10 Dover Dr, Singapore 138683, Singapore
关键词
Android malware; Mimicry attacks; Graph convolutional networks; Adversarial malware; System calls; DETECTION SYSTEM;
D O I
10.1016/j.jisa.2024.103880
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently there is an upsurge in Android malware that use obfuscation and repackaging techniques for evasion. Malware may also combine both these techniques to create stealthy adversarial mimicry samples to launch mimicry attacks. In mimicry attacks, the adversary makes sure that the static and dynamic features present in the crafted malware mimics the features present in the legitimate applications. In such cases, the existing detection mechanisms may become less effective. We found that the malicious nature of Android applications can be determined by identifying certain subgraphs that appear in their system call graphs. These subgraphs can be determined with the help of spectral clustering mechanism present in EigenGCN. With this, the system call graph G will be partitioned into two subgraphs G(1) and G(2), in which the malicious functionality if any will be present in the subgraph G(1). The graph Fourier transform based pooling technique in EigenGCN then computes the features of the subgraphs in the form of graph signals. This graph signals serve as a robust signature to detect malware. The proposed mechanism gave an accuracy of 98.7% on common malware, 97.3% on obfuscated malware, 97.8% on repackaged malware, and 90% on adversarial mimicry malware datasets. As far as we know, this is the first work that proposes a malware detection mechanism, that can detect common as well as obfuscated, repackaged, and mimicry malware in Android.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] Android Malware Detection Using Machine Learning: A Review
    Chowdhury, Naseef-Ur-Rahman
    Haque, Ahshanul
    Soliman, Hamdy
    Hossen, Mohammad Sahinur
    Fatima, Tanjim
    Ahmed, Imtiaz
    INTELLIGENT SYSTEMS AND APPLICATIONS, VOL 3, INTELLISYS 2023, 2024, 824 : 507 - 522
  • [32] Deep Android Malware Detection
    McLaughlin, Niall
    del Rincon, Jesus Martinez
    Kang, BooJoong
    Yerima, Suleiman
    Miller, Paul
    Sezer, Sakir
    Safaei, Yeganeh
    Trickel, Erik
    Zhao, Ziming
    Doup, Adam
    Ahn, Gail Joon
    PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 301 - 308
  • [33] Detection of Repackaged Android Malware
    Shahriar, Hossain
    Clincy, Victor
    2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 349 - 354
  • [34] Smart malware detection on Android
    Gheorghe, Laura
    Marin, Bogdan
    Gibson, Gary
    Mogosanu, Lucian
    Deaconescu, Razvan
    Voiculescu, Valentin-Gabriel
    Carabas, Mihai
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4254 - 4272
  • [35] TRENDS IN ANDROID MALWARE DETECTION
    Shaerpour, Kaveh
    Dehghantanha, Ali
    Mahmod, Ramlan
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2013, 8 (03) : 21 - 40
  • [36] Android malware detection model
    Yang H.
    Na Y.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2019, 46 (03): : 45 - 51
  • [37] Android Fragmentation in Malware Detection
    Long Nguyen-Vu
    Ahn, Jinung
    Jung, Souhwan
    COMPUTERS & SECURITY, 2019, 87
  • [38] On the Dissection of Evasive Malware
    D'Elia, Daniele Cono
    Coppa, Emilio
    Palmaro, Federico
    Cavallaro, Lorenzo
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 2750 - 2765
  • [39] Dynamic Extraction of Initial Behavior for Evasive Malware Detection
    Aboaoja, Faitouri A.
    Zainal, Anazida
    Ali, Abdullah Marish
    Ghaleb, Fuad A.
    Alsolami, Fawaz Jaber
    Rassam, Murad A.
    MATHEMATICS, 2023, 11 (02)
  • [40] AMDroid: Android Malware Detection Using Function Call Graphs
    Ge, Xiuting
    Pan, Ya
    Fang, Chunrong
    Fan, Yong
    2019 COMPANION OF THE 19TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS-C 2019), 2019, : 71 - 77