Deep learning for effective Android malware detection using API call graph embeddings

被引:68
|
作者
Pektas, Abdurrahman [1 ]
Acarman, Tankut [1 ]
机构
[1] Galatasaray Univ, Comp Engn Dept, TR-34349 Istanbul, Turkey
关键词
Android malware; Deep learning; Graph embedding; Hyper-parameter tuning; API call graph;
D O I
10.1007/s00500-019-03940-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
High penetration of Android applications along with their malicious variants requires efficient and effective malware detection methods to build mobile platform security. API call sequence derived from API call graph structure can be used to model application behavior accurately. Behaviors are extracted by following the API call graph, its branching, and order of calls. But identification of similarities in graphs and graph matching algorithms for classification is slow, complicated to be adopted to a new domain, and their results may be inaccurate. In this study, the authors use the API call graph as a graph representation of all possible execution paths that a malware can track during its runtime. The embedding of API call graphs transformed into a low dimension numeric vector feature set is introduced to the deep neural network. Then, similarity detection for each binary function is trained and tested effectively. This study is also focused on maximizing the performance of the network by evaluating different embedding algorithms and tuning various network configuration parameters to assure the best combination of the hyper-parameters and to reach at the highest statistical metric value. Experimental results show that the presented malware classification is reached at 98.86% level in accuracy, 98.65% in F-measure, 98.47% in recall and 98.84% in precision, respectively.
引用
收藏
页码:1027 / 1043
页数:17
相关论文
共 50 条
  • [1] Deep learning for effective Android malware detection using API call graph embeddings
    Abdurrahman Pektaş
    Tankut Acarman
    [J]. Soft Computing, 2020, 24 : 1027 - 1043
  • [2] Android Malware Detection Using Deep Learning
    Elayan, Omar N.
    Mustafa, Ahmad M.
    [J]. 12TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT) / THE 4TH INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40) / AFFILIATED WORKSHOPS, 2021, 184 : 847 - 852
  • [3] DroidDelver: An Android Malware Detection System Using Deep Belief Network Based on API Call Blocks
    Hou, Shifu
    Saas, Aaron
    Ye, Yanfang
    Chen, Lifei
    [J]. WEB-AGE INFORMATION MANAGEMENT, 2016, 9998 : 54 - 66
  • [4] Malware Classification Using Dynamically Extracted API Call Embeddings
    Aggarwal, Sahil
    Di Troia, Fabio
    [J]. APPLIED SCIENCES-BASEL, 2024, 14 (13):
  • [5] An Android Malware Detection Framework Using Graph Embeddings and Convolutional Neural Networks
    Gibert, Daniel
    Lamas, Alba
    Martins, Ruben
    Mateu, Caries
    Planes, Jordi
    [J]. ARTIFICIAL INTELLIGENCE RESEARCH AND DEVELOPMENT, 2019, 319 : 45 - 53
  • [6] Malware Detection on Android Smartphones using API Class and Machine Learning
    Westyarian
    Rosmansyah, Yusep
    Dabarsyah, Budiman
    [J]. 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS 2015, 2015, : 294 - 297
  • [7] Machine Learning for Android Malware Detection Using Permission and API Calls
    Peiravian, Naser
    Zhu, Xingquan
    [J]. 2013 IEEE 25TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI), 2013, : 300 - 305
  • [8] Android Malware Detection Using Deep Learning Methods
    Lukas, Robert
    Kolaczek, Grzegorz
    [J]. 2021 IEEE 30TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE 2021), 2021, : 119 - 124
  • [9] OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning
    Niu, Weina
    Cao, Rong
    Zhang, Xiaosong
    Ding, Kangyi
    Zhang, Kaimeng
    Li, Ting
    [J]. SENSORS, 2020, 20 (13) : 1 - 23
  • [10] Opcode-level function call graph based android malware classification using deep learning
    Niu, Weina
    Cao, Rong
    Zhang, Xiaosong
    Ding, Kangyi
    Zhang, Kaimeng
    Li, Ting
    [J]. Sensors (Switzerland), 2020, 20 (13): : 1 - 23