AMalNet: A deep learning framework based on graph convolutional networks for malware detection

被引:72
作者
Pei, Xinjun [1 ]
Yu, Long [2 ]
Tian, Shengwei [3 ]
机构
[1] Xinjiang Univ, Sch Informat Sci & Engn, Urumqi 830001, Xinjiang, Peoples R China
[2] Xinjiang Univ, Network Ctr, Urumqi 830001, Xinjiang, Peoples R China
[3] Xinjiang Univ, Sch Software, Urumqi 830001, Xinjiang, Peoples R China
关键词
Word embedding; Graph convolutional networks; Independently recurrent neural networks; Android Malware detection; Static analysis; NEURAL-NETWORKS;
D O I
10.1016/j.cose.2020.101792
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing popularity of Android apps attracted widespread attention from malware authors. Traditional malware detection systems suffer from some shortcomings; computationally expensive, insufficient performance or not robust enough. To address this challenge, we (1) build a novel and highly reliable deep learning framework, named AMalNet, to learn multiple embedding representations for Android malware detection and family attribution, (2) introduce a version of Graph Convolutional Networks (GCNs) for modeling high-level graphical semantics, which automatically identifies and learns the semantic and sequential patterns, (3) use an Independently Recurrent Neural Network (IndRNN) to decode the deep semantic information, making full use of remote dependent information between nodes to independently extract features. The experimental results on multiple benchmark datasets indicated that the AMalNet framework outperforms other state-of-the-art techniques significantly. (C) 2020 Published by Elsevier Ltd.
引用
收藏
页数:13
相关论文
共 38 条
[1]  
Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
[2]  
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1109/MSR.2016.056, 10.1145/2901739.2903508]
[3]  
[Anonymous], ANDROID MALWARE DETE
[4]  
[Anonymous], ANDROID MALWARE DETE
[5]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[6]   DroidCat: Effective Android Malware Detection and Categorization via App-Level Profiling [J].
Cai, Haipeng ;
Meng, Na ;
Ryder, Barbara ;
Yao, Daphne .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (06) :1455-1470
[7]   DroidScribe: Classifying Android Malware Based on Runtime Behavior [J].
Dash, Santanu Kumar ;
Suarez-Tangil, Guillermo ;
Khan, Salahuddin ;
Tam, Kimberly ;
Ahmadi, Mansour ;
Kinder, Johannes ;
Cavallaro, Lorenzo .
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016), 2016, :252-261
[8]   Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis [J].
Fan, Ming ;
Liu, Jun ;
Luo, Xiapu ;
Chen, Kai ;
Tian, Zhenzhou ;
Zheng, Qinghua ;
Liu, Ting .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (08) :1890-1905
[9]   Large-Scale Learnable Graph Convolutional Networks [J].
Gao, Hongyang ;
Wang, Zhengyang ;
Ji, Shuiwang .
KDD'18: PROCEEDINGS OF THE 24TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2018, :1416-1424
[10]   An in-depth analysis of Android malware using hybrid techniques [J].
Kabakus, Abdullah Talha ;
Dogru, Ibrahim Alper .
DIGITAL INVESTIGATION, 2018, 24 :25-33