Cargando…

An Android Malware Detection Approach to Enhance Node Feature Differences in a Function Call Graph Based on GCNs

The smartphone has become an indispensable tool in our daily lives, and the Android operating system is widely installed on our smartphones. This makes Android smartphones a prime target for malware. In order to address threats posed by malware, many researchers have proposed different malware detec...

Descripción completa

Detalles Bibliográficos
Autores principales: Wu, Haojie, Luktarhan, Nurbol, Tian, Gaoqi, Song, Yangyang
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10224091/
https://www.ncbi.nlm.nih.gov/pubmed/37430643
http://dx.doi.org/10.3390/s23104729
_version_ 1785050095086993408
author Wu, Haojie
Luktarhan, Nurbol
Tian, Gaoqi
Song, Yangyang
author_facet Wu, Haojie
Luktarhan, Nurbol
Tian, Gaoqi
Song, Yangyang
author_sort Wu, Haojie
collection PubMed
description The smartphone has become an indispensable tool in our daily lives, and the Android operating system is widely installed on our smartphones. This makes Android smartphones a prime target for malware. In order to address threats posed by malware, many researchers have proposed different malware detection approaches, including using a function call graph (FCG). Although an FCG can capture the complete call–callee semantic relationship of a function, it will be represented as a huge graph structure. The presence of many nonsensical nodes affects the detection efficiency. At the same time, the characteristics of the graph neural networks (GNNs) make the important node features in the FCG tend toward similar nonsensical node features during the propagation process. In our work, we propose an Android malware detection approach to enhance node feature differences in an FCG. Firstly, we propose an API-based node feature by which we can visually analyze the behavioral properties of different functions in the app and determine whether their behavior is benign or malicious. Then, we extract the FCG and the features of each function from the decompiled APK file. Next, we calculate the API coefficient inspired by the idea of the TF–IDF algorithm and extract the sensitive function called subgraph (S-FCSG) based on API coefficient ranking. Finally, before feeding the S-FCSG and node features into the GCN model, we add the self-loop for each node of the S-FCSG. A 1-D convolutional neural network and fully connected layers are used for further feature extraction and classification, respectively. The experimental result shows that our approach enhances the node feature differences in an FCG, and the detection accuracy is greater than that of models using other features, suggesting that malware detection based on a graph structure and GNNs has a lot of space for future study.
format Online
Article
Text
id pubmed-10224091
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-102240912023-05-28 An Android Malware Detection Approach to Enhance Node Feature Differences in a Function Call Graph Based on GCNs Wu, Haojie Luktarhan, Nurbol Tian, Gaoqi Song, Yangyang Sensors (Basel) Article The smartphone has become an indispensable tool in our daily lives, and the Android operating system is widely installed on our smartphones. This makes Android smartphones a prime target for malware. In order to address threats posed by malware, many researchers have proposed different malware detection approaches, including using a function call graph (FCG). Although an FCG can capture the complete call–callee semantic relationship of a function, it will be represented as a huge graph structure. The presence of many nonsensical nodes affects the detection efficiency. At the same time, the characteristics of the graph neural networks (GNNs) make the important node features in the FCG tend toward similar nonsensical node features during the propagation process. In our work, we propose an Android malware detection approach to enhance node feature differences in an FCG. Firstly, we propose an API-based node feature by which we can visually analyze the behavioral properties of different functions in the app and determine whether their behavior is benign or malicious. Then, we extract the FCG and the features of each function from the decompiled APK file. Next, we calculate the API coefficient inspired by the idea of the TF–IDF algorithm and extract the sensitive function called subgraph (S-FCSG) based on API coefficient ranking. Finally, before feeding the S-FCSG and node features into the GCN model, we add the self-loop for each node of the S-FCSG. A 1-D convolutional neural network and fully connected layers are used for further feature extraction and classification, respectively. The experimental result shows that our approach enhances the node feature differences in an FCG, and the detection accuracy is greater than that of models using other features, suggesting that malware detection based on a graph structure and GNNs has a lot of space for future study. MDPI 2023-05-13 /pmc/articles/PMC10224091/ /pubmed/37430643 http://dx.doi.org/10.3390/s23104729 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Wu, Haojie
Luktarhan, Nurbol
Tian, Gaoqi
Song, Yangyang
An Android Malware Detection Approach to Enhance Node Feature Differences in a Function Call Graph Based on GCNs
title An Android Malware Detection Approach to Enhance Node Feature Differences in a Function Call Graph Based on GCNs
title_full An Android Malware Detection Approach to Enhance Node Feature Differences in a Function Call Graph Based on GCNs
title_fullStr An Android Malware Detection Approach to Enhance Node Feature Differences in a Function Call Graph Based on GCNs
title_full_unstemmed An Android Malware Detection Approach to Enhance Node Feature Differences in a Function Call Graph Based on GCNs
title_short An Android Malware Detection Approach to Enhance Node Feature Differences in a Function Call Graph Based on GCNs
title_sort android malware detection approach to enhance node feature differences in a function call graph based on gcns
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10224091/
https://www.ncbi.nlm.nih.gov/pubmed/37430643
http://dx.doi.org/10.3390/s23104729
work_keys_str_mv AT wuhaojie anandroidmalwaredetectionapproachtoenhancenodefeaturedifferencesinafunctioncallgraphbasedongcns
AT luktarhannurbol anandroidmalwaredetectionapproachtoenhancenodefeaturedifferencesinafunctioncallgraphbasedongcns
AT tiangaoqi anandroidmalwaredetectionapproachtoenhancenodefeaturedifferencesinafunctioncallgraphbasedongcns
AT songyangyang anandroidmalwaredetectionapproachtoenhancenodefeaturedifferencesinafunctioncallgraphbasedongcns
AT wuhaojie androidmalwaredetectionapproachtoenhancenodefeaturedifferencesinafunctioncallgraphbasedongcns
AT luktarhannurbol androidmalwaredetectionapproachtoenhancenodefeaturedifferencesinafunctioncallgraphbasedongcns
AT tiangaoqi androidmalwaredetectionapproachtoenhancenodefeaturedifferencesinafunctioncallgraphbasedongcns
AT songyangyang androidmalwaredetectionapproachtoenhancenodefeaturedifferencesinafunctioncallgraphbasedongcns