Deep learning for effective Android malware detection using API call graph embeddings

被引:0
作者
Abdurrahman Pektaş
Tankut Acarman
机构
[1] Galatasaray University,Computer Engineering Department
来源
Soft Computing | 2020年 / 24卷
关键词
Android malware; Deep learning; Graph embedding; Hyper-parameter tuning; API call graph;
D O I
暂无
中图分类号
学科分类号
摘要
High penetration of Android applications along with their malicious variants requires efficient and effective malware detection methods to build mobile platform security. API call sequence derived from API call graph structure can be used to model application behavior accurately. Behaviors are extracted by following the API call graph, its branching, and order of calls. But identification of similarities in graphs and graph matching algorithms for classification is slow, complicated to be adopted to a new domain, and their results may be inaccurate. In this study, the authors use the API call graph as a graph representation of all possible execution paths that a malware can track during its runtime. The embedding of API call graphs transformed into a low dimension numeric vector feature set is introduced to the deep neural network. Then, similarity detection for each binary function is trained and tested effectively. This study is also focused on maximizing the performance of the network by evaluating different embedding algorithms and tuning various network configuration parameters to assure the best combination of the hyper-parameters and to reach at the highest statistical metric value. Experimental results show that the presented malware classification is reached at 98.86% level in accuracy, 98.65% in F-measure, 98.47% in recall and 98.84% in precision, respectively.
引用
收藏
页码:1027 / 1043
页数:16
相关论文
共 81 条
[1]  
Abadi M(2016)Tensorflow: a system for large-scale machine learning OSDI 16 265-283
[2]  
Barham P(2011)Graph-based malware detection using dynamic analysis J Comput Virol 7 247-258
[3]  
Chen J(2014)Drebin: effective and explainable detection of android malware in your pocket Ndss 14 23-26
[4]  
Chen Z(2014)Flowdroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps Acm Sigplan Not 49 259-269
[5]  
Davis A(2012)Random search for hyper-parameter optimization J Mach Learn Res 13 281-305
[6]  
Dean J(2017)Dapasa: detecting android piggybacked apps through sensitive subgraph analysis IEEE Trans Inf Forensics Secur 12 1772-1785
[7]  
Devin M(2017)Graph embedding as a new approach for unknown malware detection J Comput Virol Hack Tech 13 153-166
[8]  
Ghemawat S(2015)A review on evaluation metrics for data classification evaluations Int J Data Min Knowl Manag Process 5 01-11
[9]  
Irving G(2011)Malware classification based on call graph clustering J Comput Virol 7 233-245
[10]  
Isard M(2017)Evaluating Convolutional Neural Network for Effective Mobile Malware Detection Procedia Computer Science 112 2372-2381