An Android Malware Detection Method Using Frequent Graph Convolutional Neural Networks
Abstract
:1. Introduction
- Upon conducting a thorough analysis, it has been discovered that the dependencies among opcodes encompass significant information, exhibiting a distinctive trait of malware. To further elaborate, by constructing a graph of opcodes based on these dependencies, numerous frequent subgraphs and topological characteristics of these subgraphs were extracted. These extracted features serve as valuable representatives for the identification and detection of malware variants.
- A novel approach, utilizing graph convolutional neural networks, has been put forward by us for the purpose of detecting Android malware in a highly effective and efficient manner. This neural network architecture is capable of extracting and embedding frequent subgraphs, subsequently obtaining topological features of these subgraphs by computing the dot product between their adjacent matrices and several randomly initialized convolutional cores.
- A prototype has been successfully implemented and has undergone rigorous evaluation using Drebin [3] and the MobileSandbox project [4] datasets. The evaluation outcomes demonstrate that our method exhibits remarkable stability in attaining a high degree of accuracy, nearing 95%, while maintaining minimal detection time. Specifically, the average detection time per executable remains below 0.1 s.
2. Related Works
3. Methods
3.1. Overview of Our Approach
3.2. Dalvik Opcode Graph Construction
3.3. Frequent Subgraph Extraction
3.4. Graph Convolutional Neural Networks
4. Results
4.1. Setup, Dataset, and Validation
4.2. Data Pre-Processing
4.3. Hyper-Parameter Settings
4.4. Frequent Subgraph Analysis
4.5. Performance Comparison of Several Opcode-Based Approaches
4.6. Stability Analysis of Our Approach
5. Discussion
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Manzil, H.H.R.; Naik, S.M. Detection approaches for android malware: Taxonomy and review analysis. Expert Syst. Appl. 2024, 238, 122255. [Google Scholar] [CrossRef]
- Dalvik Opcodes. 2018. Available online: http://pallergabor.uw.hu/androidblog/dalvik_opcodes.html (accessed on 6 March 2025).
- Arp, D.; Spreitzenbarth, M.; Hubner, M.; Gascon, H.; Rieck, K. Drebin: Efficient and Explainable Detection of Android Malware in Your Pocket; Technical Report; Georg-August Institute of Computer Science: Göttingen, Germany, 2013. [Google Scholar]
- Michael, S.; Florian, E.; Thomas, S.; Felix, C.F.; Hoffmann, J. Mobile-Sandbox: Looking deeper into android applications. In Proceedings of the 28th International ACM Symposium on Applied Computing (SAC), Coimbra, Portugal, 18–22 March 2013. [Google Scholar]
- Liu, H.; Gong, L.M.X. LTAChecker: Lightweight Android Malware Detection Based on Dalvik Opcode Sequences Using Attention Temporal Networks. IEEE Internet Things J. 2024, 11, 25371–25381. [Google Scholar] [CrossRef]
- Muzaffar, A.; Ragab Hassen, H.; Zantout, H.; Lones, M.A. DroidDissector: A Static and Dynamic Analysis Tool for Android Malware Detection. In International Conference on Applied CyberSecurity; Springer Nature: Cham, Switzerland, 2023. [Google Scholar]
- Vasan, D.; Alazab, M.; Wassan, S.; Naeem, H.; Safaei, B.; Zheng, Q. IMCFN: Image-Based Malware Classification Using Fine-Tuned Convolutional Neural Network Architecture. Comput. Netw. 2020, 171, 107138. [Google Scholar] [CrossRef]
- Seneviratne, S.; Shariffdeen, R.; Rasnayaka, S.; Kasthuriarachchi, N. Self-supervised vision transformers for malware detection. IEEE Access 2022, 10, 103121–103135. [Google Scholar] [CrossRef]
- He, Z.; Homayoun, H.; Sayadi, H. Guarding Against the Unknown: Deep Transfer Learning for Hardware Image-Based Malware Detection. J. Hardw. Syst. Secur. 2024, 8, 61–78. [Google Scholar] [CrossRef]
- De Paola, A.; Gaglio, S.; Re, G.L.; Morana, M. A hybrid system for malware detection on big data. In Proceedings of the IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops, Honolulu, HI, USA, 15–19 April 2018. [Google Scholar]
- Muoz, A. Cracking the Core: Hardware Vulnerabilities in Android Devices Unveiled. Electronics 2024, 13, 4269. [Google Scholar] [CrossRef]
- Gómez, A.; Muñoz, A. Deep Learning-Based Attack Detection and Classification in Android Devices. Electronics 2023, 12, 3253. [Google Scholar] [CrossRef]
- Han, X.; Liu, S.; Liu, J.; Jiang, B.; Lu, Z.; Liu, B. ECNet: Robust Malicious Network Traffic Detection with Multi-View Feature and Confidence Mechanism. IEEE Trans. Inf. Forensics Secur. 2024, 19, 6871–6885. [Google Scholar] [CrossRef]
- Chen, J.; Sun, S.; Xia, C.; Shi, D.; Chen, G. Modeling and analyzing malware propagation over wireless networks based on hypergraphs. IEEE Trans. Netw. Sci. Eng. 2023, 10, 3767–3778. [Google Scholar] [CrossRef]
- Gibert, D.; Mateu, C.; Planes, J. HYDRA: A multimodal deep learning framewo HYDRA: A multimodal deep learning framework for malware classification. Comput. Secur. 2020, 95, 101873. [Google Scholar] [CrossRef]
- Singh, N.; Tripathy, S. MDLDroid: Multimodal Deep Learning Based Android Malware Detection. In International Conference on Information Systems Security; Springer Nature: Cham, Switzerland, 2023. [Google Scholar]
- Dai, Y.; Li, H.; Qian, Y.; Yang, R.; Zheng, M. SMASH: A malware detection method based on multi-feature ensemble learning. IEEE Access 2019, 7, 112588–112597. [Google Scholar] [CrossRef]
- Yerima, S.Y.; Sezer, S. Droidfusion: A novel multilevel classifier fusion approach for android malware detection. IEEE Trans. Cybern. 2018, 49, 453–466. [Google Scholar] [CrossRef] [PubMed]
- Xue, L.; Luo, X.; Yu, L.; Wang, S.; Wu, D. Adaptive Unpacking of Android Apps. In Proceedings of the IEEE/ACM 39th International Conference on Software Engineering (ICSE), Buenos Aires, Argentina, 20–28 May 2017. [Google Scholar]
- Dedexer. 2024. Available online: http://dedexer.sourceforge.net/ (accessed on 6 March 2025).
- Gradient Descent. 2018. Available online: https://en.wikipedia.org/wiki/Gradient_descent (accessed on 6 March 2025).
- Google Play. 2024. Available online: http://vxheaven.org/vl.php (accessed on 6 March 2025).
- Cesare, S.; Xiang, Y.; Zhou, W. Control Flow-Based Malware Variant Detection. IEEE Trans. Dependable Secur. Comput. (TDSC) 2014, 11, 230–817. [Google Scholar]
Malware Family | Number |
---|---|
FakeInstaller | 925 |
DroidKungFu | 667 |
Plankton | 625 |
Opfake | 613 |
GingerMaster | 339 |
BaseBridge | 330 |
Iconosys | 152 |
Others | 1909 |
Total | 5560 |
Item | Value |
---|---|
Number of convolutional layers | 1 |
Number of convolutional cores | 5 |
Size of each convolutional core | 5 × 5 |
Number of pooling layers | 1 |
Number of pooling cores | 5 |
Size of each pooling core | 2 × 2 |
Method | Detection | Training | Disassembly |
---|---|---|---|
Time Cost | Time Cost | Time Cost | |
Our approach (GCN) | 0.045 s | 57.68 h | 24.98 s |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhao, Y.; Sun, S.; Huang, X.; Zhang, J. An Android Malware Detection Method Using Frequent Graph Convolutional Neural Networks. Electronics 2025, 14, 1151. https://doi.org/10.3390/electronics14061151
Zhao Y, Sun S, Huang X, Zhang J. An Android Malware Detection Method Using Frequent Graph Convolutional Neural Networks. Electronics. 2025; 14(6):1151. https://doi.org/10.3390/electronics14061151
Chicago/Turabian StyleZhao, Yulong, Shi Sun, Xiaofeng Huang, and Jixin Zhang. 2025. "An Android Malware Detection Method Using Frequent Graph Convolutional Neural Networks" Electronics 14, no. 6: 1151. https://doi.org/10.3390/electronics14061151
APA StyleZhao, Y., Sun, S., Huang, X., & Zhang, J. (2025). An Android Malware Detection Method Using Frequent Graph Convolutional Neural Networks. Electronics, 14(6), 1151. https://doi.org/10.3390/electronics14061151