IoT-Based Android Malware Detection Using Graph Neural Network With Adversarial Defense

被引:62
作者
Yumlembam, Rahul [1 ]
Issac, Biju [1 ]
Jacob, Seibu Mary [2 ]
Yang, Longzhi [1 ]
机构
[1] Northumbria Univ, Dept Comp & Informat Sci, Newcastle Upon Tyne NE1 8ST, England
[2] Teesside Univ, Sch Comp Engn & Digital Technol, Middlesbrough TS1 3BX, England
基金
英国工程与自然科学研究理事会;
关键词
Malware; Internet of Things; Codes; Feature extraction; Detectors; Deep learning; Classification algorithms; Android; deep learning; generative adversarial network (GAN); graph neural network (GNN); Internet of Things (IoT); machine learning;
D O I
10.1109/JIOT.2022.3188583
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since the Internet of Things (IoT) is widely adopted using Android applications, detecting malicious Android apps is essential. In recent years, Android graph-based deep learning research has proposed many approaches to extract relationships from the application as a graph to generate graph embeddings. First, we demonstrate the effectiveness of graph-based classification using graph neural networks (GNNs)-based classifier to generate API graph embedding. The graph embedding is used with "Permission" and "Intent" to train multiple machine learning and deep learning algorithms to detect Android malware. The classification achieved an accuracy of 98.33% in CICMaldroid and 98.68% in the Drebin data set. However, the graph-based deep learning is vulnerable as an attacker can add fake relationships to avoid detection by the classifier. Second, we propose a generative adversarial network (GAN)-based algorithm named VGAE-MalGAN to attack the graph-based GNN Android malware classifier. The VGAE-MalGAN generator generates adversarial malware API graphs, and the VGAE-MalGAN substitute detector (SD) tries to fit the detector. Experimental analysis shows that VGAE-MalGAN can effectively reduce the detection rate of GNN malware classifiers. Although the model fails to detect adversarial malware, experimental analysis shows that retraining the model with generated adversarial samples helps to combat adversarial attacks.
引用
收藏
页码:8432 / 8444
页数:13
相关论文
共 38 条
[1]   Explainability of Cybersecurity Threats Data Using SHAP [J].
Alenezi, Rafa ;
Ludwig, Simone A. .
2021 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI 2021), 2021,
[2]  
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1109/MSR.2016.056, 10.1145/2901739.2903508]
[3]  
[Anonymous], About Us
[4]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[5]  
Av-Test. "The independent IT security institute, IND IT SEC I A MALW
[6]   FAMD: A Fast Multifeature Android Malware Detection Framework, Design, and Implementation [J].
Bai, Hongpeng ;
Xie, Nannan ;
Di, Xiaoqiang ;
Ye, Qing .
IEEE ACCESS, 2020, 8 (08) :194729-194740
[7]   Learning features from enhanced function call graphs for Android malware detection [J].
Cai, Minghui ;
Jiang, Yuan ;
Gao, Cuiying ;
Li, Heng ;
Yuan, Wei .
NEUROCOMPUTING, 2021, 423 :301-307
[8]   Let the Cat out of the Bag: Popular Android IoT Apps under Security Scrutiny [J].
Chatzoglou, Efstratios ;
Kambourakis, Georgios ;
Smiliotopoulos, Christos .
SENSORS, 2022, 22 (02)
[9]   Using Generative Adversarial Networks for Data Augmentation in Android Malware Detection [J].
Chen, Yi-Ming ;
Yang, Chun-Hsien ;
Chen, Guo-Chung .
2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
[10]  
Goodfellow IJ, 2014, ADV NEUR IN, V27, P2672