Deep learning for effective Android malware detection using API call graph embeddings

被引:0
作者
Abdurrahman Pektaş
Tankut Acarman
机构
[1] Galatasaray University,Computer Engineering Department
来源
Soft Computing | 2020年 / 24卷
关键词
Android malware; Deep learning; Graph embedding; Hyper-parameter tuning; API call graph;
D O I
暂无
中图分类号
学科分类号
摘要
High penetration of Android applications along with their malicious variants requires efficient and effective malware detection methods to build mobile platform security. API call sequence derived from API call graph structure can be used to model application behavior accurately. Behaviors are extracted by following the API call graph, its branching, and order of calls. But identification of similarities in graphs and graph matching algorithms for classification is slow, complicated to be adopted to a new domain, and their results may be inaccurate. In this study, the authors use the API call graph as a graph representation of all possible execution paths that a malware can track during its runtime. The embedding of API call graphs transformed into a low dimension numeric vector feature set is introduced to the deep neural network. Then, similarity detection for each binary function is trained and tested effectively. This study is also focused on maximizing the performance of the network by evaluating different embedding algorithms and tuning various network configuration parameters to assure the best combination of the hyper-parameters and to reach at the highest statistical metric value. Experimental results show that the presented malware classification is reached at 98.86% level in accuracy, 98.65% in F-measure, 98.47% in recall and 98.84% in precision, respectively.
引用
收藏
页码:1027 / 1043
页数:16
相关论文
共 81 条
[11]  
Anderson B(2017)Deep neural architectures for large scale android malware analysis Cluster Computing 21 569-588
[12]  
Quist D(2014)A dynamic malware analyzer against virtual machine aware malicious software Secur Commun Netw 7 2245-2257
[13]  
Neil J(2018)Malware classification based on API calls and behaviour analysis IET Information Security 12 107-117
[14]  
Storlie C(1979)Constructing the call graph of a program IEEE Trans Softw Eng 5 216-226
[15]  
Lane T(2014)Dropout: a simple way to prevent neural networks from overfitting J Mach Learn Res 15 1929-1958
[16]  
Arp D(2017)The evolution of android malware and android analysis techniques ACM Comput Surv 49 76:1-76:41
[17]  
Spreitzenbarth M(2017)Back-propagation neural network on markov chains from system call sequences: a new approach for detecting android malware with system call sequences IET Inf Secur 11 8-15
[18]  
Hubner M(2016)Droiddetector: android malware characterization and detection using deep learning Tsinghua Sci Technol 21 114-123
[19]  
Gascon H(2009)Comparing stars: on approximating graph edit distance Proc VLDB Endow 2 25-36
[20]  
Rieck K(undefined)undefined undefined undefined undefined-undefined