A Comparison of Graph Neural Networks for Malware Classification

03/22/2023
by   Vrinda Malhotra, et al.
0

Managing the threat posed by malware requires accurate detection and classification techniques. Traditional detection strategies, such as signature scanning, rely on manual analysis of malware to extract relevant features, which is labor intensive and requires expert knowledge. Function call graphs consist of a set of program functions and their inter-procedural calls, providing a rich source of information that can be leveraged to classify malware without the labor intensive feature extraction step of traditional techniques. In this research, we treat malware classification as a graph classification problem. Based on Local Degree Profile features, we train a wide range of Graph Neural Network (GNN) architectures to generate embeddings which we then classify. We find that our best GNN models outperform previous comparable research involving the well-known MalNet-Tiny Android malware dataset. In addition, our GNN models do not suffer from the overfitting issues that commonly afflict non-GNN techniques, although GNN models require longer training times.

READ FULL TEXT

page 16

page 17

research
01/19/2022

Graph Neural Network-based Android Malware Classification with Jumping Knowledge

This paper presents a new Android malware detection method based on Grap...
research
03/05/2021

NF-GNN: Network Flow Graph Neural Networks for Malware Detection and Classification

Malicious software (malware) poses an increasing threat to the security ...
research
06/01/2023

Interpreting GNN-based IDS Detections Using Provenance Graph Structural Features

The black-box nature of complex Neural Network (NN)-based models has hin...
research
06/16/2020

Isometric Graph Neural Networks

Many tasks that rely on representations of nodes in graphs would benefit...
research
07/22/2018

Deep learning at the shallow end: Malware classification for non-domain experts

Current malware detection and classification approaches generally rely o...
research
05/24/2023

Foundational Models for Malware Embeddings Using Spatio-Temporal Parallel Convolutional Networks

In today's interconnected digital landscape, the proliferation of malwar...
research
04/12/2022

Malware Analysis with Symbolic Execution and Graph Kernel

Malware analysis techniques are divided into static and dynamic analysis...

Please sign up or login with your details

Forgot password? Click here to reset