A malware detection model based on imbalanced heterogeneous graph embeddings

计算机科学 恶意软件 数据挖掘 分类器(UML) 图形 人工智能 机器学习 Android(操作系统) 理论计算机科学 计算机安全 操作系统
作者
Tun Li,Ya Wen Luo,Xin Wan,Qian Li,Qilie Liu,Rong Wang,Chaolong Jia,Yunpeng Xiao
出处
期刊:Expert Systems With Applications [Elsevier]
卷期号:246: 123109-123109 被引量:8
标识
DOI:10.1016/j.eswa.2023.123109
摘要

The proliferation of malware in recent years has posed a significant threat to the security of computers and mobile devices. Detecting malware, especially on the Android platform, has become a growing concern for researchers and the software industry. This paper proposes a new method for detecting Android malware based on unbalanced heterogeneous graph embedding. First of all, most malware datasets contain an imbalance of malicious and benign samples, since some types of malware are scarce and difficult to collect. Thus, as a result of this problem, the classification algorithm is unable to analyze the minority samples through sufficient data, resulting in poor downstream classifier performance, in light of the fact that adversarial generation networks possess the characteristic of completing data, an algorithm for generating graph structure data is presented, in which nodes are generated to simulate the distribution of minority nodes within a network topology. Then, considering that heterogeneous information networks have the characteristics of retaining rich node semantic features and mining implicit relationships, heterogeneous graphs are used to construct models for different types of entities (i.e. Apps, APIs, permissions, intents, etc.) and different meta-paths. Finally, a new method is introduced to alleviate the over-smoothing phenomenon of node information in the propagation of deep network. In the deep GCN, we first sample the leader nodes of each layer node, and then add a residual connection and an identity map in order to determine the characteristics of the high-order leader. In this paper, a self-attention-based semantic fusion method is also applied to adaptively fuse embedded representations of software nodes under different meta-paths. The test results demonstrate that the proposed IHODroid model effectively detects malicious software. In the DREBIN dataset, which consists of 123,453 Android applications and 5,560 malicious samples, the IHODroid model achieves an accuracy of 0.9360 and an F1 score of 0.9360, outperforming other state-of-the-art baseline methods.
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI
更新
PDF的下载单位、IP信息已删除 (2025-6-4)

科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
bfsd凡完成签到 ,获得积分10
1秒前
4秒前
6秒前
xxfsx应助zhendezy采纳,获得10
6秒前
ASDq完成签到,获得积分20
7秒前
科研韭菜完成签到 ,获得积分10
9秒前
Qing完成签到 ,获得积分10
10秒前
leon完成签到 ,获得积分10
10秒前
11秒前
小马甲应助阳光的牛牛采纳,获得10
11秒前
瓦罐完成签到 ,获得积分10
11秒前
量子星尘发布了新的文献求助10
12秒前
bfsd凡关注了科研通微信公众号
13秒前
14秒前
lightman完成签到,获得积分10
16秒前
阿伟1999完成签到,获得积分10
17秒前
哈哈哈完成签到 ,获得积分10
18秒前
大气夜山完成签到 ,获得积分10
19秒前
科研通AI6应助黄雪峰采纳,获得10
19秒前
爆米花应助ff采纳,获得10
19秒前
甜甜醉波完成签到,获得积分10
20秒前
闫永娟完成签到 ,获得积分10
20秒前
21秒前
花花糖果完成签到 ,获得积分10
21秒前
我独舞完成签到 ,获得积分10
22秒前
zhendezy完成签到,获得积分10
23秒前
25秒前
杨涵完成签到 ,获得积分10
25秒前
故意的初阳完成签到 ,获得积分10
25秒前
ppchenup完成签到,获得积分10
26秒前
wen完成签到 ,获得积分10
26秒前
科研王完成签到,获得积分10
26秒前
量子星尘发布了新的文献求助10
27秒前
gqw3505完成签到,获得积分10
28秒前
29秒前
SCI的芷蝶完成签到 ,获得积分10
29秒前
30秒前
完美世界应助灯座采纳,获得10
31秒前
31秒前
orixero应助zixian采纳,获得10
31秒前
高分求助中
(应助此贴封号)【重要!!请各用户(尤其是新用户)详细阅读】【科研通的精品贴汇总】 10000
The Social Work Ethics Casebook: Cases and Commentary (revised 2nd ed.).. Frederic G. Reamer 1070
Introduction to Early Childhood Education 1000
2025-2031年中国兽用抗生素行业发展深度调研与未来趋势报告 1000
List of 1,091 Public Pension Profiles by Region 901
Item Response Theory 800
Identifying dimensions of interest to support learning in disengaged students: the MINE project 600
热门求助领域 (近24小时)
化学 材料科学 医学 生物 工程类 有机化学 生物化学 物理 纳米技术 计算机科学 内科学 化学工程 复合材料 物理化学 基因 遗传学 催化作用 冶金 量子力学 光电子学
热门帖子
关注 科研通微信公众号,转发送积分 5426968
求助须知:如何正确求助?哪些是违规求助? 4540537
关于积分的说明 14172398
捐赠科研通 4458456
什么是DOI,文献DOI怎么找? 2445019
邀请新用户注册赠送积分活动 1436061
关于科研通互助平台的介绍 1413567