期刊文献+

基于改进的图注意机制模型的安卓恶意软件检测方法研究

Research on Android Malware Detection Method based on the Improved Graph Attention Mechanism Model
在线阅读 下载PDF
导出
摘要 在当下恶意软件蔓延的背景下,恶意软件检测需求不断增加。提出一种基于改进的图注意机制模型的安卓恶意软件检测方法,通过静态分析提取API调用图,显示出应用程序的行为。通过使用SDNE图嵌入算法,从API调用图中进行结构特征和内容特征的学习。在模型学习的过程中,采用一种计算双向图注意力权重的策略,旨在提高对相似节点的保留,并增强节点属性之间的相似性。最后,借助自注意力卷积层生成权重自适应的表示,并在池化层中生成图嵌入表示,以用于检测任务。基于CICMalDroid 2020数据集显示,该方法在安卓恶意软件检测领域表现出较高的有效性,准确率达到97.90%。与原有的图注意力网络模型相比,准确率提升0.03%,验证了该方法的实用性和有效性。该研究成果显示出该方法在应对不断增长的恶意软件威胁方面具有潜力,可为安卓恶意软件检测提供更准确和可靠的解决方案。 In the context of the spread of malware,the demand for malware detection is increasing.This paper presents an Android malware detection method based on an improved graph attention mechanism model.The methodology in-volves extracting the API call graph through static analysis,which shows the behavior of the application.Subsequently,the structural features and content features are acquired from the API call graph by using the SDNE graph embedding al-gorithm.In the process of model learning,a strategy is adopted to calculate the bidirectional graph attention weights,ai-ming to improve the retention of similar nodes and enhance the similarity between node properties.Finally,a weight-a-daptive representation is generated with the help of the self-attention convolution layer,and a graph embedding represen-tation is generated in the pooling layer for use in the detection task.The experimental results are based on the CICMal-Droid 2020 data set,showing that this method shows high effectiveness in the field of Android malware detection,with an accuracy of 97.90%.Compared with the original graph attention network model,it improves the accuracy by 0.03%,verifying the practicability and effectiveness of the proposed method.The results show the potential to deal with growing malware threats and to provide a more accurate and reliable solution for Android malware detection.
作者 唐明婕 甘刚 TANG Mingjie;GAN Gang(College of Cybersecurity,Chengdu University of Information Technology,Chengdu 610225,China)
出处 《成都信息工程大学学报》 2025年第1期21-28,共8页 Journal of Chengdu University of Information Technology
基金 四川省科技计划资助项目(23ZDYF0380、2021ZYD0011)。
关键词 API调用图 SDNE嵌入 双向图注意力 安卓恶意软件检测 API call graph SDNE embedding bidirectional graph attention Android malware detection
  • 相关文献

参考文献4

二级参考文献23

  • 1IDC. Android marks fourth anniversary since launch with 75.0% market share in third quarter, according to IDC EEB/OL]. (2012-11-01) [2013-01-02]. http:// www. idc. com/getdoc, j sp ? containerld = prUS23771812.
  • 2Enck W, Ongtang M, McDaniel P. On lightweight mo- bile phone application certification [ C ]//Proceedings of the 16th ACM Conference on Computer and Communi- cations Security. Chicago, IL, USA, 2009:235 -245.
  • 3Zhou Yajin, Wang Zhi, Zhou Wu, et al. Hey, you, get off of my market: detecting malicious apps in offi- cial and alternative Android markets[C ]//Proc of the 19th Annual Network and Distributed System Security Symposium. San Diego, CA, USA: 2012:1-13.
  • 4Zhou Wu, Zhou Yajin, Jiang Xuxian, et al. Detecting repackaged smartphone applications in third-party An- droid marketplaces [ C ]//Proceedings of the Second ACM Conference on Data and Application Security and Privacy. San Antonio, TX, USA, 2012:317-326.
  • 5Schmidt A-D, Bye R, Schmidt H-G, et al. Static anal- ysis of executables for collaborative malware detection on Android [ C ]//2009 IEEE International Conference on Communications. Dresden, Germany, 2009 : 1 - 5.
  • 6Shabtai A, Elovici Y. Applying behavioral detection on Android-based devices [ C ]//3rd International Confer- ence on Mobile Wireless Middleware, Operating Sys- tems, and Applications. Chicago, IL, USA, 2010:235 - 249.
  • 7Shabtai A, Kanonov U, Elovici Y, et al. "Androma- ly" : a behavioral malware detection framework for an- droid devices [ J ]. Journal of Intelligent Information Systems, 2012, 38(1) :161 - 190.
  • 8Zhao Min, Ge Fangbin, Zhang Tao, et al. AntiMal- Droid: an efficient SVM-based malware detection framework for android [ C ]//2nd International Confer- ence on Information Computing and Applications. Qin- huangdao, China, 2011:158 - 166.
  • 9工业和信息化部.移动互联网恶意代码描述规范[EB/OL].(2011-05-14)[2013-01-02].http://wen-ku.baidu.com/view/2978e18ccc22bcdl26frOc90.ht-m1.
  • 10孔德光,郑烇,帅建梅,陈超,葛瑶.基于污点分析的源代码脆弱性检测技术[J].小型微型计算机系统,2009,30(1):78-82. 被引量:12

共引文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部