A malware detection model based on imbalanced heterogeneous graph embeddings

计算机科学 恶意软件 数据挖掘 分类器(UML) 图形 人工智能 机器学习 Android(操作系统) 理论计算机科学 计算机安全 操作系统
作者
Tun Li,Ya Wen Luo,Xin Wan,Qian Li,Qilie Liu,Rong Wang,Chaolong Jia,Yunpeng Xiao
出处
期刊:Expert Systems With Applications [Elsevier BV]
卷期号:246: 123109-123109 被引量:8
标识
DOI:10.1016/j.eswa.2023.123109
摘要

The proliferation of malware in recent years has posed a significant threat to the security of computers and mobile devices. Detecting malware, especially on the Android platform, has become a growing concern for researchers and the software industry. This paper proposes a new method for detecting Android malware based on unbalanced heterogeneous graph embedding. First of all, most malware datasets contain an imbalance of malicious and benign samples, since some types of malware are scarce and difficult to collect. Thus, as a result of this problem, the classification algorithm is unable to analyze the minority samples through sufficient data, resulting in poor downstream classifier performance, in light of the fact that adversarial generation networks possess the characteristic of completing data, an algorithm for generating graph structure data is presented, in which nodes are generated to simulate the distribution of minority nodes within a network topology. Then, considering that heterogeneous information networks have the characteristics of retaining rich node semantic features and mining implicit relationships, heterogeneous graphs are used to construct models for different types of entities (i.e. Apps, APIs, permissions, intents, etc.) and different meta-paths. Finally, a new method is introduced to alleviate the over-smoothing phenomenon of node information in the propagation of deep network. In the deep GCN, we first sample the leader nodes of each layer node, and then add a residual connection and an identity map in order to determine the characteristics of the high-order leader. In this paper, a self-attention-based semantic fusion method is also applied to adaptively fuse embedded representations of software nodes under different meta-paths. The test results demonstrate that the proposed IHODroid model effectively detects malicious software. In the DREBIN dataset, which consists of 123,453 Android applications and 5,560 malicious samples, the IHODroid model achieves an accuracy of 0.9360 and an F1 score of 0.9360, outperforming other state-of-the-art baseline methods.

科研通智能强力驱动
Strongly Powered by AbleSci AI
科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
seal完成签到,获得积分10
刚刚
刚刚
涛涛完成签到,获得积分10
刚刚
机灵紫伊完成签到,获得积分10
1秒前
希望天下0贩的0应助linan采纳,获得10
2秒前
你好啊完成签到,获得积分10
2秒前
小王完成签到,获得积分10
3秒前
大气迎天完成签到,获得积分10
3秒前
明天天气真好完成签到,获得积分10
3秒前
yuki瑞完成签到,获得积分10
4秒前
等待黎明完成签到,获得积分10
4秒前
4秒前
ared完成签到 ,获得积分10
5秒前
俺寻思者完成签到,获得积分10
5秒前
VanessaW完成签到,获得积分10
5秒前
DAdump1ing完成签到,获得积分10
6秒前
研友_nPb9e8完成签到,获得积分10
6秒前
光亮的洙完成签到,获得积分10
6秒前
杨丽完成签到,获得积分10
6秒前
phantom13完成签到,获得积分10
6秒前
活力断天完成签到,获得积分10
7秒前
兴奋小丸子完成签到,获得积分10
7秒前
8秒前
9秒前
bio-tang完成签到,获得积分10
9秒前
9秒前
摆烂完成签到 ,获得积分10
10秒前
东郭千愁完成签到,获得积分10
10秒前
山水完成签到,获得积分10
10秒前
10秒前
linan完成签到,获得积分10
10秒前
10秒前
周某某完成签到,获得积分10
11秒前
11秒前
strama完成签到,获得积分10
11秒前
秋归晚完成签到,获得积分10
12秒前
phantom13发布了新的文献求助10
12秒前
研友_Z3342Z完成签到,获得积分10
14秒前
微风低回发布了新的文献求助10
14秒前
linan发布了新的文献求助10
15秒前
高分求助中
(应助此贴封号)【重要!!请各用户(尤其是新用户)详细阅读】【科研通的精品贴汇总】 10000
The Organometallic Chemistry of the Transition Metals 800
Chemistry and Physics of Carbon Volume 18 800
The Organometallic Chemistry of the Transition Metals 800
The formation of Australian attitudes towards China, 1918-1941 640
Signals, Systems, and Signal Processing 610
全相对论原子结构与含时波包动力学的理论研究--清华大学 500
热门求助领域 (近24小时)
化学 材料科学 医学 生物 纳米技术 工程类 有机化学 化学工程 生物化学 计算机科学 物理 内科学 复合材料 催化作用 物理化学 光电子学 电极 细胞生物学 基因 无机化学
热门帖子
关注 科研通微信公众号,转发送积分 6440991
求助须知:如何正确求助?哪些是违规求助? 8254828
关于积分的说明 17572839
捐赠科研通 5499314
什么是DOI,文献DOI怎么找? 2900113
邀请新用户注册赠送积分活动 1876802
关于科研通互助平台的介绍 1716941