Android Malware Detection Based on Structural Features of the Function Call Graph

The openness of Android operating system not only brings convenience to users, but also leads to the attack threat from a large number of malicious applications (apps). Thus malware detection has become the research focus in the field of mobile security. In order to solve the problem of more coarse-...

Full description

Bibliographic Details
Main Authors: Yang Yang, Xuehui Du, Zhi Yang, Xing Liu
Format: Article
Language:English
Published: MDPI AG 2021-01-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/10/2/186
_version_ 1797411111841038336
author Yang Yang
Xuehui Du
Zhi Yang
Xing Liu
author_facet Yang Yang
Xuehui Du
Zhi Yang
Xing Liu
author_sort Yang Yang
collection DOAJ
description The openness of Android operating system not only brings convenience to users, but also leads to the attack threat from a large number of malicious applications (apps). Thus malware detection has become the research focus in the field of mobile security. In order to solve the problem of more coarse-grained feature selection and larger feature loss of graph structure existing in the current detection methods, we put forward a method named DGCNDroid for Android malware detection, which is based on the deep graph convolutional network. Our method starts by generating a function call graph for the decompiled Android application. Then the function call subgraph containing the sensitive application programming interface (API) is extracted. Finally, the function call subgraphs with structural features are trained as the input of the deep graph convolutional network. Thus the detection and classification of malicious apps can be realized. Through experimentation on a dataset containing 11,120 Android apps, the method proposed in this paper can achieve detection accuracy of 98.2%, which is higher than other existing detection methods.
first_indexed 2024-03-09T04:40:17Z
format Article
id doaj.art-ae816188f5ff49bba106ebc9d2ea44ca
institution Directory Open Access Journal
issn 2079-9292
language English
last_indexed 2024-03-09T04:40:17Z
publishDate 2021-01-01
publisher MDPI AG
record_format Article
series Electronics
spelling doaj.art-ae816188f5ff49bba106ebc9d2ea44ca2023-12-03T13:21:58ZengMDPI AGElectronics2079-92922021-01-0110218610.3390/electronics10020186Android Malware Detection Based on Structural Features of the Function Call GraphYang Yang0Xuehui Du1Zhi Yang2Xing Liu3Zhengzhou Information Science and Technology Institute, Information Engineering University, Zhengzhou 450001, ChinaZhengzhou Information Science and Technology Institute, Information Engineering University, Zhengzhou 450001, ChinaZhengzhou Information Science and Technology Institute, Information Engineering University, Zhengzhou 450001, ChinaInformation Security Research Center, China Electronics Standardization Institute, Beijing 100007, ChinaThe openness of Android operating system not only brings convenience to users, but also leads to the attack threat from a large number of malicious applications (apps). Thus malware detection has become the research focus in the field of mobile security. In order to solve the problem of more coarse-grained feature selection and larger feature loss of graph structure existing in the current detection methods, we put forward a method named DGCNDroid for Android malware detection, which is based on the deep graph convolutional network. Our method starts by generating a function call graph for the decompiled Android application. Then the function call subgraph containing the sensitive application programming interface (API) is extracted. Finally, the function call subgraphs with structural features are trained as the input of the deep graph convolutional network. Thus the detection and classification of malicious apps can be realized. Through experimentation on a dataset containing 11,120 Android apps, the method proposed in this paper can achieve detection accuracy of 98.2%, which is higher than other existing detection methods.https://www.mdpi.com/2079-9292/10/2/186Androidmalware detectionfunction call graphgraph convolutional network
spellingShingle Yang Yang
Xuehui Du
Zhi Yang
Xing Liu
Android Malware Detection Based on Structural Features of the Function Call Graph
Electronics
Android
malware detection
function call graph
graph convolutional network
title Android Malware Detection Based on Structural Features of the Function Call Graph
title_full Android Malware Detection Based on Structural Features of the Function Call Graph
title_fullStr Android Malware Detection Based on Structural Features of the Function Call Graph
title_full_unstemmed Android Malware Detection Based on Structural Features of the Function Call Graph
title_short Android Malware Detection Based on Structural Features of the Function Call Graph
title_sort android malware detection based on structural features of the function call graph
topic Android
malware detection
function call graph
graph convolutional network
url https://www.mdpi.com/2079-9292/10/2/186
work_keys_str_mv AT yangyang androidmalwaredetectionbasedonstructuralfeaturesofthefunctioncallgraph
AT xuehuidu androidmalwaredetectionbasedonstructuralfeaturesofthefunctioncallgraph
AT zhiyang androidmalwaredetectionbasedonstructuralfeaturesofthefunctioncallgraph
AT xingliu androidmalwaredetectionbasedonstructuralfeaturesofthefunctioncallgraph