Comprehensive benchmarking of knowledge graph embeddings methods for Android malware detection

被引:0
作者
Kincl, Jan [1 ,3 ,5 ]
Eftimov, Tome [2 ]
Viktorin, Adam [4 ]
Senkerik, Roman [4 ]
Pavleska, Tanja [1 ]
机构
[1] Jozef Stefan Inst, Lab Open Syst & Networks, Jamova Cesta 39, Ljubljana 1000, Slovenia
[2] Jozef Stefan Inst, Comp Syst Dept, Jamova Cesta 39, Ljubljana 1000, Slovenia
[3] Jozef Stefan Int Postgrad Sch, Jamova Cesta 39, Ljubljana 1000, Slovenia
[4] Tomas Bata Univ Zlin, Fac Appl Informat, nam T G Masaryka 5555, Zlin 76001, Czech Republic
[5] Univ Newcastle, Sch Informat & Phys Sci, Univ Dr, Newcastle, NSW 2308, Australia
关键词
Mobile android security; Knowledge graphs embeddings; Machine learning; Android malware detection; CODE;
D O I
10.1016/j.eswa.2025.127888
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The rising popularity and open-source model of the Android operating system has made it a main target for attackers creating malware applications. With the mobile industry being an expanding device ecosystem, there is a critical need for developing effective methods to protect against mobile malware. Recognizing the latest approaches and their limitations, we have conducted a comprehensive empirical analysis on the applicability of knowledge graphs for malware detection in view of the influence of the scoring functions, the vector dimension, the stability of the obtained results, the performance of the individual classifiers, and other important time dependencies. In addition, we propose a knowledge-graph based method aimed at improving the quality of classification input data, while offering greater interfacing capabilities with external knowledge and lower computational complexity. The proposed method offers a new perspective on working with Android malware, demonstrating a unique data processing pipeline for malware sample identification and encouraging further innovation in the field. Our findings demonstrate that knowledge graph representation is not only feasible, but also provides well-performing results, remaining competitive with state-of-the-art approaches.
引用
收藏
页数:13
相关论文
共 68 条
[1]   Improved Malware Detection Model with Apriori Association Rule and Particle Swarm Optimization [J].
Adebayo, Olawale Surajudeen ;
Aziz, Normaziah Abdul .
SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
[2]   Federated Learning for Cybersecurity: Concepts, Challenges, and Future Directions [J].
Alazab, Mamoun ;
Priya, Swarna R. M. ;
Parimala, M. ;
Maddikunta, Praveen Kumar Reddy ;
Gadekallu, Thippa Reddy ;
Quoc-Viet Pham .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (05) :3501-3509
[3]   Static malware detection and attribution in android byte-code through an end-to-end deep system [J].
Amin, Muhammad ;
Tanveer, Tamleek Ali ;
Tehseen, Mohammad ;
Khan, Murad ;
Khan, Fakhri Alam ;
Anwar, Sajid .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 102 :112-126
[4]  
Android Developers, 2023, Application fundamentals
[5]  
[Anonymous], 2021, Threat Intelligence Report 2020
[6]  
Arif Juliza Mohamad, 2021, 2021 International Conference on Software Engineering & Computer Systems and 4th International Conference on Computational Science and Information Management (ICSECS-ICOCSIM), P580, DOI 10.1109/ICSECS52883.2021.00112
[7]   Permission-Based Malware Detection System for Android Using Machine Learning Techniques [J].
Arslan, Recep Sinan ;
Dogru, Ibrahim Alper ;
Barisci, Necaattin .
INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2019, 29 (01) :43-61
[8]  
Bitdefender, 2024, Large language models for malware analysis
[9]  
Ceci L., 2024, Mobile internet usage worldwide-statistics & facts
[10]   A review: Knowledge reasoning over knowledge graph [J].
Chen, Xiaojun ;
Jia, Shengbin ;
Xiang, Yang .
EXPERT SYSTEMS WITH APPLICATIONS, 2020, 141