HGNNDroid: Android Malware Detection Based on Heterogeneous Graph Neural Network

被引:0
作者
Liu, Xingyu [1 ]
Liu, Xiaozhen [2 ]
Hao, Kegang [3 ]
Wang, Ke [1 ]
Chen, Xinglong [3 ]
Niu, Weina [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu, Peoples R China
[2] Chengdu Wonder Explorer Technol Co Ltd, Chengdu, Peoples R China
[3] Southwest China Res Inst Elect Equipment, Chengdu, Peoples R China
来源
2024 IEEE 9TH INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE, DSC | 2024年
基金
美国国家科学基金会;
关键词
android; malware detection; heterogeneous graph neural network; hybrid analysis;
D O I
10.1109/DSC63484.2024.00057
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rapid development of mobile internet, smartphones have become indispensable tools in people's daily lives. As the predominant mobile operating system, Android records various user information, making it a prime target for malicious attacks. In response to the increasing threat of malware, scholars have proposed various feature extraction methods and innovative models to detect Android malware. Researchers have introduced detection methods based on heterogeneous graph to leverage the intrinsic information and the correlation information of samples. However, existing methods lack sufficient mining of semantic information from feature nodes. To address this issue, we propose HGNNDroid, an Android malware detection method based on hybrid analysis and a heterogeneous graph neural network. It utilizes hybrid analysis to extract features from APK files, constructing a more comprehensive behavioral profile of the samples. Subsequently, a heterogeneous graph neural network with a two-layer semantic fusion mechanism performs the classification task. The network aggregates the semantic information of features from different perspectives and utilizes meta-paths to discover the potential structural relationships, thereby achieving more accurate Android malware detection. On the CICMalDroid 2020 dataset, the F1-score reached 98.72%, outperforming HAWK and five other methods.
引用
收藏
页码:378 / 384
页数:7
相关论文
共 28 条
[21]   An android malware dynamic detection method based on service call co-occurrence matrices [J].
Wang, Chundong ;
Li, Zhiyuan ;
Mo, Xiuliang ;
Yang, Hong ;
Zhao, Yi .
ANNALS OF TELECOMMUNICATIONS, 2017, 72 (9-10) :607-615
[22]   Aper: Evolution-Aware Runtime Permission Misuse Detection for Android Apps [J].
Wang, Sinan ;
Wang, Yibo ;
Zhan, Xian ;
Wang, Ying ;
Liu, Yepang ;
Luo, Xiapu ;
Cheung, Shing-Chi .
2022 ACM/IEEE 44TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2022), 2022, :125-137
[23]   Heterogeneous Graph Attention Network [J].
Wang, Xiao ;
Ji, Houye ;
Shi, Chuan ;
Wang, Bai ;
Cui, Peng ;
Yu, P. ;
Ye, Yanfang .
WEB CONFERENCE 2019: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW 2019), 2019, :2022-2032
[24]   ICCDetector: ICC-Based Malware Detection on Android [J].
Xu, Ke ;
Li, Yingjiu ;
Deng, Robert H. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) :1252-1264
[25]   Detecting and Categorizing Android Malware with Graph Neural Networks [J].
Xu, Peng ;
Eckert, Claudia ;
Zarras, Apostolis .
36TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2021, 2021, :409-412
[26]  
Yang XC, 2023, AAAI CONF ARTIF INTE, P10816
[27]   Hybrid sequence-based Android malware detection using natural language processing [J].
Zhang, Nan ;
Xue, Jingfeng ;
Ma, Yuxi ;
Zhang, Ruyun ;
Liang, Tiancai ;
Tan, Yu-an .
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2021, 36 (10) :5770-5784
[28]   Enhancing State-of-the-art Classifiers with API Semantics to Detect Evolved Android Malware [J].
Zhang, Xiaohan ;
Zhang, Yuan ;
Zhong, Ming ;
Ding, Daizong ;
Cao, Yinzhi ;
Zhang, Yukun ;
Zhang, Mi ;
Yang, Min .
CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, :757-770