Cargando…
An Android Malware Detection Approach to Enhance Node Feature Differences in a Function Call Graph Based on GCNs
The smartphone has become an indispensable tool in our daily lives, and the Android operating system is widely installed on our smartphones. This makes Android smartphones a prime target for malware. In order to address threats posed by malware, many researchers have proposed different malware detec...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10224091/ https://www.ncbi.nlm.nih.gov/pubmed/37430643 http://dx.doi.org/10.3390/s23104729 |
_version_ | 1785050095086993408 |
---|---|
author | Wu, Haojie Luktarhan, Nurbol Tian, Gaoqi Song, Yangyang |
author_facet | Wu, Haojie Luktarhan, Nurbol Tian, Gaoqi Song, Yangyang |
author_sort | Wu, Haojie |
collection | PubMed |
description | The smartphone has become an indispensable tool in our daily lives, and the Android operating system is widely installed on our smartphones. This makes Android smartphones a prime target for malware. In order to address threats posed by malware, many researchers have proposed different malware detection approaches, including using a function call graph (FCG). Although an FCG can capture the complete call–callee semantic relationship of a function, it will be represented as a huge graph structure. The presence of many nonsensical nodes affects the detection efficiency. At the same time, the characteristics of the graph neural networks (GNNs) make the important node features in the FCG tend toward similar nonsensical node features during the propagation process. In our work, we propose an Android malware detection approach to enhance node feature differences in an FCG. Firstly, we propose an API-based node feature by which we can visually analyze the behavioral properties of different functions in the app and determine whether their behavior is benign or malicious. Then, we extract the FCG and the features of each function from the decompiled APK file. Next, we calculate the API coefficient inspired by the idea of the TF–IDF algorithm and extract the sensitive function called subgraph (S-FCSG) based on API coefficient ranking. Finally, before feeding the S-FCSG and node features into the GCN model, we add the self-loop for each node of the S-FCSG. A 1-D convolutional neural network and fully connected layers are used for further feature extraction and classification, respectively. The experimental result shows that our approach enhances the node feature differences in an FCG, and the detection accuracy is greater than that of models using other features, suggesting that malware detection based on a graph structure and GNNs has a lot of space for future study. |
format | Online Article Text |
id | pubmed-10224091 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-102240912023-05-28 An Android Malware Detection Approach to Enhance Node Feature Differences in a Function Call Graph Based on GCNs Wu, Haojie Luktarhan, Nurbol Tian, Gaoqi Song, Yangyang Sensors (Basel) Article The smartphone has become an indispensable tool in our daily lives, and the Android operating system is widely installed on our smartphones. This makes Android smartphones a prime target for malware. In order to address threats posed by malware, many researchers have proposed different malware detection approaches, including using a function call graph (FCG). Although an FCG can capture the complete call–callee semantic relationship of a function, it will be represented as a huge graph structure. The presence of many nonsensical nodes affects the detection efficiency. At the same time, the characteristics of the graph neural networks (GNNs) make the important node features in the FCG tend toward similar nonsensical node features during the propagation process. In our work, we propose an Android malware detection approach to enhance node feature differences in an FCG. Firstly, we propose an API-based node feature by which we can visually analyze the behavioral properties of different functions in the app and determine whether their behavior is benign or malicious. Then, we extract the FCG and the features of each function from the decompiled APK file. Next, we calculate the API coefficient inspired by the idea of the TF–IDF algorithm and extract the sensitive function called subgraph (S-FCSG) based on API coefficient ranking. Finally, before feeding the S-FCSG and node features into the GCN model, we add the self-loop for each node of the S-FCSG. A 1-D convolutional neural network and fully connected layers are used for further feature extraction and classification, respectively. The experimental result shows that our approach enhances the node feature differences in an FCG, and the detection accuracy is greater than that of models using other features, suggesting that malware detection based on a graph structure and GNNs has a lot of space for future study. MDPI 2023-05-13 /pmc/articles/PMC10224091/ /pubmed/37430643 http://dx.doi.org/10.3390/s23104729 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Wu, Haojie Luktarhan, Nurbol Tian, Gaoqi Song, Yangyang An Android Malware Detection Approach to Enhance Node Feature Differences in a Function Call Graph Based on GCNs |
title | An Android Malware Detection Approach to Enhance Node Feature Differences in a Function Call Graph Based on GCNs |
title_full | An Android Malware Detection Approach to Enhance Node Feature Differences in a Function Call Graph Based on GCNs |
title_fullStr | An Android Malware Detection Approach to Enhance Node Feature Differences in a Function Call Graph Based on GCNs |
title_full_unstemmed | An Android Malware Detection Approach to Enhance Node Feature Differences in a Function Call Graph Based on GCNs |
title_short | An Android Malware Detection Approach to Enhance Node Feature Differences in a Function Call Graph Based on GCNs |
title_sort | android malware detection approach to enhance node feature differences in a function call graph based on gcns |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10224091/ https://www.ncbi.nlm.nih.gov/pubmed/37430643 http://dx.doi.org/10.3390/s23104729 |
work_keys_str_mv | AT wuhaojie anandroidmalwaredetectionapproachtoenhancenodefeaturedifferencesinafunctioncallgraphbasedongcns AT luktarhannurbol anandroidmalwaredetectionapproachtoenhancenodefeaturedifferencesinafunctioncallgraphbasedongcns AT tiangaoqi anandroidmalwaredetectionapproachtoenhancenodefeaturedifferencesinafunctioncallgraphbasedongcns AT songyangyang anandroidmalwaredetectionapproachtoenhancenodefeaturedifferencesinafunctioncallgraphbasedongcns AT wuhaojie androidmalwaredetectionapproachtoenhancenodefeaturedifferencesinafunctioncallgraphbasedongcns AT luktarhannurbol androidmalwaredetectionapproachtoenhancenodefeaturedifferencesinafunctioncallgraphbasedongcns AT tiangaoqi androidmalwaredetectionapproachtoenhancenodefeaturedifferencesinafunctioncallgraphbasedongcns AT songyangyang androidmalwaredetectionapproachtoenhancenodefeaturedifferencesinafunctioncallgraphbasedongcns |