Android Malware Detection Based on Structural Features of the Function Call Graph

被引:12
|
作者
Yang, Yang [1 ,2 ]
Du, Xuehui [1 ,2 ]
Yang, Zhi [1 ,2 ]
Liu, Xing [3 ]
机构
[1] Informat Engn Univ, Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450001, Peoples R China
[2] Informat Engn Univ, Henan Prov Key Lab Informat Secur, Zhengzhou 450001, Peoples R China
[3] China Elect Standardizat Inst, Informat Secur Res Ctr, Beijing 100007, Peoples R China
基金
中国国家自然科学基金;
关键词
Android; malware detection; function call graph; graph convolutional network;
D O I
10.3390/electronics10020186
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The openness of Android operating system not only brings convenience to users, but also leads to the attack threat from a large number of malicious applications (apps). Thus malware detection has become the research focus in the field of mobile security. In order to solve the problem of more coarse-grained feature selection and larger feature loss of graph structure existing in the current detection methods, we put forward a method named DGCNDroid for Android malware detection, which is based on the deep graph convolutional network. Our method starts by generating a function call graph for the decompiled Android application. Then the function call subgraph containing the sensitive application programming interface (API) is extracted. Finally, the function call subgraphs with structural features are trained as the input of the deep graph convolutional network. Thus the detection and classification of malicious apps can be realized. Through experimentation on a dataset containing 11,120 Android apps, the method proposed in this paper can achieve detection accuracy of 98.2%, which is higher than other existing detection methods.
引用
收藏
页码:1 / 18
页数:17
相关论文
共 50 条
  • [31] A Comparison of Features for Android Malware Detection
    Leeds, Matthew
    Keffeler, Miclain
    Atkison, Travis
    PROCEEDINGS OF THE SOUTHEAST CONFERENCE ACM SE'17, 2017, : 63 - 68
  • [32] Scalable Function Call Graph-based Malware Classification
    Hassen, Mehadi
    Chan, Philip K.
    PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 239 - 248
  • [33] IoT Malware Detection Using Function-Call-Graph Embedding
    Wu, Chia-Yi
    Ban, Tao
    Cheng, Shin-Ming
    Sun, Bo
    Takahashi, Takeshi
    2021 18TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2021,
  • [34] A Malware and Variant Detection Method Using Function Call Graph Isomorphism
    Bai, Jinrong
    Shi, Qibin
    Mu, Shiguang
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [35] Malware Similarity Identification Using Call Graph Based System Call Subsequence Features
    Blokhin, Kristina
    Saxe, Josh
    Mentis, David
    2013 33RD IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2013), 2013, : 6 - 10
  • [36] Malware Classification Based on Graph Convolutional Neural Networks and Static Call Graph Features
    Mester, Attila
    Bodo, Zalan
    ADVANCES AND TRENDS IN ARTIFICIAL INTELLIGENCE: THEORY AND PRACTICES IN ARTIFICIAL INTELLIGENCE, 2022, 13343 : 528 - 539
  • [37] Analysis of Android malware family characteristic based on isomorphism of sensitive API call graph
    Zhou, Hao
    Zhang, Wei
    Wei, Fengqiong
    Chen, Yunfang
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 319 - 327
  • [38] An unknown malware detection scheme based on the features of graph
    Zhao, Zongqu
    Wang, Junfeng
    Wang, Chonggang
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (02) : 239 - 246
  • [39] DroidRadar: Android Malware Detection Based on Global Sensitive Graph Embedding
    Song, Qige
    Zhang, Yongzheng
    Yao, Junliang
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 802 - 809
  • [40] WHGDroid: Effective android malware detection based on weighted heterogeneous graph
    Huang, Lu
    Xue, Jingfeng
    Wang, Yong
    Liu, Zhenyan
    Chen, Junbao
    Kong, Zixiao
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 77