Android Malware Detection Based on Structural Features of the Function Call Graph

被引:13
作者
Yang, Yang [1 ,2 ]
Du, Xuehui [1 ,2 ]
Yang, Zhi [1 ,2 ]
Liu, Xing [3 ]
机构
[1] Informat Engn Univ, Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450001, Peoples R China
[2] Informat Engn Univ, Henan Prov Key Lab Informat Secur, Zhengzhou 450001, Peoples R China
[3] China Elect Standardizat Inst, Informat Secur Res Ctr, Beijing 100007, Peoples R China
基金
中国国家自然科学基金;
关键词
Android; malware detection; function call graph; graph convolutional network;
D O I
10.3390/electronics10020186
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The openness of Android operating system not only brings convenience to users, but also leads to the attack threat from a large number of malicious applications (apps). Thus malware detection has become the research focus in the field of mobile security. In order to solve the problem of more coarse-grained feature selection and larger feature loss of graph structure existing in the current detection methods, we put forward a method named DGCNDroid for Android malware detection, which is based on the deep graph convolutional network. Our method starts by generating a function call graph for the decompiled Android application. Then the function call subgraph containing the sensitive application programming interface (API) is extracted. Finally, the function call subgraphs with structural features are trained as the input of the deep graph convolutional network. Thus the detection and classification of malicious apps can be realized. Through experimentation on a dataset containing 11,120 Android apps, the method proposed in this paper can achieve detection accuracy of 98.2%, which is higher than other existing detection methods.
引用
收藏
页码:1 / 18
页数:17
相关论文
共 36 条
  • [1] Al Shebli H. M. Z., 2018, 2018 IEEE LONG ISL S, P1, DOI DOI 10.1109/LISAT.2018.8378035
  • [2] SysDroid: a dynamic ML-based android malware analyzer using system call traces
    Ananya, A.
    Aswathy, A.
    Amal, T. R.
    Swathy, P. G.
    Vinod, P.
    Shojafar, Mohammad
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (04): : 2789 - 2808
  • [3] [Anonymous], ANDROID PASSES 2 5 B
  • [4] [Anonymous], MOBILE PHONE SECURIT
  • [5] [Anonymous], 2014, Mobile cyber threats: Kaspersky lab INTERPOL joint report
  • [6] [Anonymous], SMARTPHONE MARKET SH
  • [7] Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
    Arp, Daniel
    Spreitzenbarth, Michael
    Huebner, Malte
    Gascon, Hugo
    Rieck, Konrad
    [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [8] Backes M, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P1101
  • [9] Dai G., 2015, P 8 ACM C SEC PRIV W, P1
  • [10] Defferrard M, 2016, P ADV NEUR INF PROC, P3844